Mar 21 14:02:33 localhost kernel: Linux version 5.14.0-687.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-72.el9) #1 SMP PREEMPT_DYNAMIC Mon Feb 23 11:11:46 UTC 2026 Mar 21 14:02:33 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Mar 21 14:02:33 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 root=UUID=97c78989-359a-4bad-a2f1-e793fa797b35 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Mar 21 14:02:33 localhost kernel: BIOS-provided physical RAM map: Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Mar 21 14:02:33 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Mar 21 14:02:33 localhost kernel: NX (Execute Disable) protection: active Mar 21 14:02:33 localhost kernel: APIC: Static calls initialized Mar 21 14:02:33 localhost kernel: SMBIOS 2.8 present. Mar 21 14:02:33 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Mar 21 14:02:33 localhost kernel: Hypervisor detected: KVM Mar 21 14:02:33 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 21 14:02:33 localhost kernel: kvm-clock: using sched offset of 8959900038 cycles Mar 21 14:02:33 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 21 14:02:33 localhost kernel: tsc: Detected 2799.998 MHz processor Mar 21 14:02:33 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 21 14:02:33 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 21 14:02:33 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Mar 21 14:02:33 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Mar 21 14:02:33 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 21 14:02:33 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Mar 21 14:02:33 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Mar 21 14:02:33 localhost kernel: Using GB pages for direct mapping Mar 21 14:02:33 localhost kernel: RAMDISK: [mem 0x1b6b6000-0x29b52fff] Mar 21 14:02:33 localhost kernel: ACPI: Early table checksum verification disabled Mar 21 14:02:33 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Mar 21 14:02:33 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 21 14:02:33 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 21 14:02:33 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 21 14:02:33 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Mar 21 14:02:33 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 21 14:02:33 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 21 14:02:33 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Mar 21 14:02:33 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Mar 21 14:02:33 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Mar 21 14:02:33 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Mar 21 14:02:33 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Mar 21 14:02:33 localhost kernel: No NUMA configuration found Mar 21 14:02:33 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Mar 21 14:02:33 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd3000-0x23fffdfff] Mar 21 14:02:33 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Mar 21 14:02:33 localhost kernel: Zone ranges: Mar 21 14:02:33 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 21 14:02:33 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 21 14:02:33 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Mar 21 14:02:33 localhost kernel: Device empty Mar 21 14:02:33 localhost kernel: Movable zone start for each node Mar 21 14:02:33 localhost kernel: Early memory node ranges Mar 21 14:02:33 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Mar 21 14:02:33 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Mar 21 14:02:33 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Mar 21 14:02:33 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Mar 21 14:02:33 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 21 14:02:33 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Mar 21 14:02:33 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Mar 21 14:02:33 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Mar 21 14:02:33 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 21 14:02:33 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 21 14:02:33 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 21 14:02:33 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 21 14:02:33 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 21 14:02:33 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 21 14:02:33 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 21 14:02:33 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 21 14:02:33 localhost kernel: TSC deadline timer available Mar 21 14:02:33 localhost kernel: CPU topo: Max. logical packages: 8 Mar 21 14:02:33 localhost kernel: CPU topo: Max. logical dies: 8 Mar 21 14:02:33 localhost kernel: CPU topo: Max. dies per package: 1 Mar 21 14:02:33 localhost kernel: CPU topo: Max. threads per core: 1 Mar 21 14:02:33 localhost kernel: CPU topo: Num. cores per package: 1 Mar 21 14:02:33 localhost kernel: CPU topo: Num. threads per package: 1 Mar 21 14:02:33 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Mar 21 14:02:33 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Mar 21 14:02:33 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Mar 21 14:02:33 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Mar 21 14:02:33 localhost kernel: Booting paravirtualized kernel on KVM Mar 21 14:02:33 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 21 14:02:33 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Mar 21 14:02:33 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Mar 21 14:02:33 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Mar 21 14:02:33 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Mar 21 14:02:33 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Mar 21 14:02:33 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 root=UUID=97c78989-359a-4bad-a2f1-e793fa797b35 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Mar 21 14:02:33 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64", will be passed to user space. Mar 21 14:02:33 localhost kernel: random: crng init done Mar 21 14:02:33 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 21 14:02:33 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 21 14:02:33 localhost kernel: Fallback order for Node 0: 0 Mar 21 14:02:33 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Mar 21 14:02:33 localhost kernel: Policy zone: Normal Mar 21 14:02:33 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 21 14:02:33 localhost kernel: software IO TLB: area num 8. Mar 21 14:02:33 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Mar 21 14:02:33 localhost kernel: ftrace: allocating 49605 entries in 194 pages Mar 21 14:02:33 localhost kernel: ftrace: allocated 194 pages with 3 groups Mar 21 14:02:33 localhost kernel: Dynamic Preempt: voluntary Mar 21 14:02:33 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Mar 21 14:02:33 localhost kernel: rcu: RCU event tracing is enabled. Mar 21 14:02:33 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Mar 21 14:02:33 localhost kernel: Trampoline variant of Tasks RCU enabled. Mar 21 14:02:33 localhost kernel: Rude variant of Tasks RCU enabled. Mar 21 14:02:33 localhost kernel: Tracing variant of Tasks RCU enabled. Mar 21 14:02:33 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 21 14:02:33 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Mar 21 14:02:33 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Mar 21 14:02:33 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Mar 21 14:02:33 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Mar 21 14:02:33 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Mar 21 14:02:33 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Mar 21 14:02:33 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Mar 21 14:02:33 localhost kernel: Console: colour VGA+ 80x25 Mar 21 14:02:33 localhost kernel: printk: console [ttyS0] enabled Mar 21 14:02:33 localhost kernel: ACPI: Core revision 20230331 Mar 21 14:02:33 localhost kernel: APIC: Switch to symmetric I/O mode setup Mar 21 14:02:33 localhost kernel: x2apic enabled Mar 21 14:02:33 localhost kernel: APIC: Switched APIC routing to: physical x2apic Mar 21 14:02:33 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Mar 21 14:02:33 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Mar 21 14:02:33 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Mar 21 14:02:33 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Mar 21 14:02:33 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Mar 21 14:02:33 localhost kernel: mitigations: Enabled attack vectors: user_kernel, user_user, guest_host, guest_guest, SMT mitigations: auto Mar 21 14:02:33 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Mar 21 14:02:33 localhost kernel: Spectre V2 : Mitigation: Retpolines Mar 21 14:02:33 localhost kernel: RETBleed: Mitigation: untrained return thunk Mar 21 14:02:33 localhost kernel: Speculative Return Stack Overflow: Mitigation: SMT disabled Mar 21 14:02:33 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 21 14:02:33 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Mar 21 14:02:33 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Mar 21 14:02:33 localhost kernel: active return thunk: retbleed_return_thunk Mar 21 14:02:33 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 21 14:02:33 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 21 14:02:33 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 21 14:02:33 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 21 14:02:33 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 21 14:02:33 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Mar 21 14:02:33 localhost kernel: Freeing SMP alternatives memory: 40K Mar 21 14:02:33 localhost kernel: pid_max: default: 32768 minimum: 301 Mar 21 14:02:33 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Mar 21 14:02:33 localhost kernel: landlock: Up and running. Mar 21 14:02:33 localhost kernel: Yama: becoming mindful. Mar 21 14:02:33 localhost kernel: SELinux: Initializing. Mar 21 14:02:33 localhost kernel: LSM support for eBPF active Mar 21 14:02:33 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 21 14:02:33 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 21 14:02:33 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Mar 21 14:02:33 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Mar 21 14:02:33 localhost kernel: ... version: 0 Mar 21 14:02:33 localhost kernel: ... bit width: 48 Mar 21 14:02:33 localhost kernel: ... generic registers: 6 Mar 21 14:02:33 localhost kernel: ... value mask: 0000ffffffffffff Mar 21 14:02:33 localhost kernel: ... max period: 00007fffffffffff Mar 21 14:02:33 localhost kernel: ... fixed-purpose events: 0 Mar 21 14:02:33 localhost kernel: ... event mask: 000000000000003f Mar 21 14:02:33 localhost kernel: signal: max sigframe size: 1776 Mar 21 14:02:33 localhost kernel: rcu: Hierarchical SRCU implementation. Mar 21 14:02:33 localhost kernel: rcu: Max phase no-delay instances is 400. Mar 21 14:02:33 localhost kernel: smp: Bringing up secondary CPUs ... Mar 21 14:02:33 localhost kernel: smpboot: x86: Booting SMP configuration: Mar 21 14:02:33 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Mar 21 14:02:33 localhost kernel: smp: Brought up 1 node, 8 CPUs Mar 21 14:02:33 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Mar 21 14:02:33 localhost kernel: node 0 deferred pages initialised in 12ms Mar 21 14:02:33 localhost kernel: Memory: 7617624K/8388068K available (16384K kernel code, 5797K rwdata, 13956K rodata, 4204K init, 7172K bss, 764508K reserved, 0K cma-reserved) Mar 21 14:02:33 localhost kernel: devtmpfs: initialized Mar 21 14:02:33 localhost kernel: x86/mm: Memory block size: 128MB Mar 21 14:02:33 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 21 14:02:33 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Mar 21 14:02:33 localhost kernel: pinctrl core: initialized pinctrl subsystem Mar 21 14:02:33 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 21 14:02:33 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Mar 21 14:02:33 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 21 14:02:33 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 21 14:02:33 localhost kernel: audit: initializing netlink subsys (disabled) Mar 21 14:02:33 localhost kernel: audit: type=2000 audit(1774116152.094:1): state=initialized audit_enabled=0 res=1 Mar 21 14:02:33 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Mar 21 14:02:33 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 21 14:02:33 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Mar 21 14:02:33 localhost kernel: cpuidle: using governor menu Mar 21 14:02:33 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 21 14:02:33 localhost kernel: PCI: Using configuration type 1 for base access Mar 21 14:02:33 localhost kernel: PCI: Using configuration type 1 for extended access Mar 21 14:02:33 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 21 14:02:33 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Mar 21 14:02:33 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Mar 21 14:02:33 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Mar 21 14:02:33 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Mar 21 14:02:33 localhost kernel: Demotion targets for Node 0: null Mar 21 14:02:33 localhost kernel: cryptd: max_cpu_qlen set to 1000 Mar 21 14:02:33 localhost kernel: ACPI: Added _OSI(Module Device) Mar 21 14:02:33 localhost kernel: ACPI: Added _OSI(Processor Device) Mar 21 14:02:33 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 21 14:02:33 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 21 14:02:33 localhost kernel: ACPI: Interpreter enabled Mar 21 14:02:33 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Mar 21 14:02:33 localhost kernel: ACPI: Using IOAPIC for interrupt routing Mar 21 14:02:33 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 21 14:02:33 localhost kernel: PCI: Using E820 reservations for host bridge windows Mar 21 14:02:33 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Mar 21 14:02:33 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 21 14:02:33 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Mar 21 14:02:33 localhost kernel: acpiphp: Slot [3] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [4] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [5] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [6] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [7] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [8] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [9] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [10] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [11] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [12] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [13] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [14] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [15] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [16] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [17] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [18] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [19] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [20] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [21] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [22] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [23] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [24] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [25] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [26] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [27] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [28] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [29] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [30] registered Mar 21 14:02:33 localhost kernel: acpiphp: Slot [31] registered Mar 21 14:02:33 localhost kernel: PCI host bridge to bus 0000:00 Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 21 14:02:33 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Mar 21 14:02:33 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Mar 21 14:02:33 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Mar 21 14:02:33 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Mar 21 14:02:33 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Mar 21 14:02:33 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Mar 21 14:02:33 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Mar 21 14:02:33 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 21 14:02:33 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Mar 21 14:02:33 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Mar 21 14:02:33 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Mar 21 14:02:33 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Mar 21 14:02:33 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Mar 21 14:02:33 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Mar 21 14:02:33 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Mar 21 14:02:33 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Mar 21 14:02:33 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Mar 21 14:02:33 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Mar 21 14:02:33 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Mar 21 14:02:33 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Mar 21 14:02:33 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 21 14:02:33 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 21 14:02:33 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 21 14:02:33 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 21 14:02:33 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Mar 21 14:02:33 localhost kernel: iommu: Default domain type: Translated Mar 21 14:02:33 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 21 14:02:33 localhost kernel: SCSI subsystem initialized Mar 21 14:02:33 localhost kernel: ACPI: bus type USB registered Mar 21 14:02:33 localhost kernel: usbcore: registered new interface driver usbfs Mar 21 14:02:33 localhost kernel: usbcore: registered new interface driver hub Mar 21 14:02:33 localhost kernel: usbcore: registered new device driver usb Mar 21 14:02:33 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Mar 21 14:02:33 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 21 14:02:33 localhost kernel: PTP clock support registered Mar 21 14:02:33 localhost kernel: EDAC MC: Ver: 3.0.0 Mar 21 14:02:33 localhost kernel: NetLabel: Initializing Mar 21 14:02:33 localhost kernel: NetLabel: domain hash size = 128 Mar 21 14:02:33 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Mar 21 14:02:33 localhost kernel: NetLabel: unlabeled traffic allowed by default Mar 21 14:02:33 localhost kernel: PCI: Using ACPI for IRQ routing Mar 21 14:02:33 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Mar 21 14:02:33 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Mar 21 14:02:33 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Mar 21 14:02:33 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 21 14:02:33 localhost kernel: vgaarb: loaded Mar 21 14:02:33 localhost kernel: clocksource: Switched to clocksource kvm-clock Mar 21 14:02:33 localhost kernel: VFS: Disk quotas dquot_6.6.0 Mar 21 14:02:33 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 21 14:02:33 localhost kernel: pnp: PnP ACPI init Mar 21 14:02:33 localhost kernel: pnp 00:03: [dma 2] Mar 21 14:02:33 localhost kernel: pnp: PnP ACPI: found 5 devices Mar 21 14:02:33 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 21 14:02:33 localhost kernel: NET: Registered PF_INET protocol family Mar 21 14:02:33 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 21 14:02:33 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Mar 21 14:02:33 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 21 14:02:33 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 21 14:02:33 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Mar 21 14:02:33 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Mar 21 14:02:33 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Mar 21 14:02:33 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 21 14:02:33 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 21 14:02:33 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 21 14:02:33 localhost kernel: NET: Registered PF_XDP protocol family Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Mar 21 14:02:33 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Mar 21 14:02:33 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Mar 21 14:02:33 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Mar 21 14:02:33 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Mar 21 14:02:33 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 23826 usecs Mar 21 14:02:33 localhost kernel: PCI: CLS 0 bytes, default 64 Mar 21 14:02:33 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 21 14:02:33 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Mar 21 14:02:33 localhost kernel: ACPI: bus type thunderbolt registered Mar 21 14:02:33 localhost kernel: Trying to unpack rootfs image as initramfs... Mar 21 14:02:33 localhost kernel: Initialise system trusted keyrings Mar 21 14:02:33 localhost kernel: Key type blacklist registered Mar 21 14:02:33 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Mar 21 14:02:33 localhost kernel: zbud: loaded Mar 21 14:02:33 localhost kernel: integrity: Platform Keyring initialized Mar 21 14:02:33 localhost kernel: integrity: Machine keyring initialized Mar 21 14:02:33 localhost kernel: Freeing initrd memory: 234100K Mar 21 14:02:33 localhost kernel: NET: Registered PF_ALG protocol family Mar 21 14:02:33 localhost kernel: xor: automatically using best checksumming function avx Mar 21 14:02:33 localhost kernel: Key type asymmetric registered Mar 21 14:02:33 localhost kernel: Asymmetric key parser 'x509' registered Mar 21 14:02:33 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Mar 21 14:02:33 localhost kernel: io scheduler mq-deadline registered Mar 21 14:02:33 localhost kernel: io scheduler kyber registered Mar 21 14:02:33 localhost kernel: io scheduler bfq registered Mar 21 14:02:33 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Mar 21 14:02:33 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Mar 21 14:02:33 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Mar 21 14:02:33 localhost kernel: ACPI: button: Power Button [PWRF] Mar 21 14:02:33 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Mar 21 14:02:33 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Mar 21 14:02:33 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Mar 21 14:02:33 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 21 14:02:33 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 21 14:02:33 localhost kernel: Non-volatile memory driver v1.3 Mar 21 14:02:33 localhost kernel: rdac: device handler registered Mar 21 14:02:33 localhost kernel: hp_sw: device handler registered Mar 21 14:02:33 localhost kernel: emc: device handler registered Mar 21 14:02:33 localhost kernel: alua: device handler registered Mar 21 14:02:33 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Mar 21 14:02:33 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Mar 21 14:02:33 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Mar 21 14:02:33 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Mar 21 14:02:33 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Mar 21 14:02:33 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Mar 21 14:02:33 localhost kernel: usb usb1: Product: UHCI Host Controller Mar 21 14:02:33 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-687.el9.x86_64 uhci_hcd Mar 21 14:02:33 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Mar 21 14:02:33 localhost kernel: hub 1-0:1.0: USB hub found Mar 21 14:02:33 localhost kernel: hub 1-0:1.0: 2 ports detected Mar 21 14:02:33 localhost kernel: usbcore: registered new interface driver usbserial_generic Mar 21 14:02:33 localhost kernel: usbserial: USB Serial support registered for generic Mar 21 14:02:33 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 21 14:02:33 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 21 14:02:33 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 21 14:02:33 localhost kernel: mousedev: PS/2 mouse device common for all mice Mar 21 14:02:33 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Mar 21 14:02:33 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Mar 21 14:02:33 localhost kernel: rtc_cmos 00:04: registered as rtc0 Mar 21 14:02:33 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-03-21T18:02:32 UTC (1774116152) Mar 21 14:02:33 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Mar 21 14:02:33 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Mar 21 14:02:33 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Mar 21 14:02:33 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Mar 21 14:02:33 localhost kernel: usbcore: registered new interface driver usbhid Mar 21 14:02:33 localhost kernel: usbhid: USB HID core driver Mar 21 14:02:33 localhost kernel: drop_monitor: Initializing network drop monitor service Mar 21 14:02:33 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Mar 21 14:02:33 localhost kernel: Initializing XFRM netlink socket Mar 21 14:02:33 localhost kernel: NET: Registered PF_INET6 protocol family Mar 21 14:02:33 localhost kernel: Segment Routing with IPv6 Mar 21 14:02:33 localhost kernel: NET: Registered PF_PACKET protocol family Mar 21 14:02:33 localhost kernel: mpls_gso: MPLS GSO support Mar 21 14:02:33 localhost kernel: IPI shorthand broadcast: enabled Mar 21 14:02:33 localhost kernel: AVX2 version of gcm_enc/dec engaged. Mar 21 14:02:33 localhost kernel: AES CTR mode by8 optimization enabled Mar 21 14:02:33 localhost kernel: sched_clock: Marking stable (1059005741, 139607290)->(1315148609, -116535578) Mar 21 14:02:33 localhost kernel: registered taskstats version 1 Mar 21 14:02:33 localhost kernel: Loading compiled-in X.509 certificates Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: fea3310e757009fdf4938aef125dfb5a1f0e3bc0' Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Mar 21 14:02:33 localhost kernel: Demotion targets for Node 0: null Mar 21 14:02:33 localhost kernel: page_owner is disabled Mar 21 14:02:33 localhost kernel: Key type .fscrypt registered Mar 21 14:02:33 localhost kernel: Key type fscrypt-provisioning registered Mar 21 14:02:33 localhost kernel: Key type big_key registered Mar 21 14:02:33 localhost kernel: Key type encrypted registered Mar 21 14:02:33 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Mar 21 14:02:33 localhost kernel: Loading compiled-in module X.509 certificates Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: fea3310e757009fdf4938aef125dfb5a1f0e3bc0' Mar 21 14:02:33 localhost kernel: ima: Allocated hash algorithm: sha256 Mar 21 14:02:33 localhost kernel: ima: No architecture policies found Mar 21 14:02:33 localhost kernel: evm: Initialising EVM extended attributes: Mar 21 14:02:33 localhost kernel: evm: security.selinux Mar 21 14:02:33 localhost kernel: evm: security.SMACK64 (disabled) Mar 21 14:02:33 localhost kernel: evm: security.SMACK64EXEC (disabled) Mar 21 14:02:33 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Mar 21 14:02:33 localhost kernel: evm: security.SMACK64MMAP (disabled) Mar 21 14:02:33 localhost kernel: evm: security.apparmor (disabled) Mar 21 14:02:33 localhost kernel: evm: security.ima Mar 21 14:02:33 localhost kernel: evm: security.capability Mar 21 14:02:33 localhost kernel: evm: HMAC attrs: 0x1 Mar 21 14:02:33 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Mar 21 14:02:33 localhost kernel: Running certificate verification RSA selftest Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Mar 21 14:02:33 localhost kernel: Running certificate verification ECDSA selftest Mar 21 14:02:33 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Mar 21 14:02:33 localhost kernel: clk: Disabling unused clocks Mar 21 14:02:33 localhost kernel: Freeing unused decrypted memory: 2028K Mar 21 14:02:33 localhost kernel: Freeing unused kernel image (initmem) memory: 4204K Mar 21 14:02:33 localhost kernel: Write protecting the kernel read-only data: 30720k Mar 21 14:02:33 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 380K Mar 21 14:02:33 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Mar 21 14:02:33 localhost kernel: Run /init as init process Mar 21 14:02:33 localhost kernel: with arguments: Mar 21 14:02:33 localhost kernel: /init Mar 21 14:02:33 localhost kernel: with environment: Mar 21 14:02:33 localhost kernel: HOME=/ Mar 21 14:02:33 localhost kernel: TERM=linux Mar 21 14:02:33 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 Mar 21 14:02:33 localhost systemd[1]: systemd 252-67.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 21 14:02:33 localhost systemd[1]: Detected virtualization kvm. Mar 21 14:02:33 localhost systemd[1]: Detected architecture x86-64. Mar 21 14:02:33 localhost systemd[1]: Running in initrd. Mar 21 14:02:33 localhost systemd[1]: No hostname configured, using default hostname. Mar 21 14:02:33 localhost systemd[1]: Hostname set to . Mar 21 14:02:33 localhost systemd[1]: Initializing machine ID from VM UUID. Mar 21 14:02:33 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Mar 21 14:02:33 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Mar 21 14:02:33 localhost kernel: usb 1-1: Product: QEMU USB Tablet Mar 21 14:02:33 localhost kernel: usb 1-1: Manufacturer: QEMU Mar 21 14:02:33 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Mar 21 14:02:33 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Mar 21 14:02:33 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Mar 21 14:02:33 localhost systemd[1]: Queued start job for default target Initrd Default Target. Mar 21 14:02:33 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Mar 21 14:02:33 localhost systemd[1]: Reached target Local Encrypted Volumes. Mar 21 14:02:33 localhost systemd[1]: Reached target Initrd /usr File System. Mar 21 14:02:33 localhost systemd[1]: Reached target Local File Systems. Mar 21 14:02:33 localhost systemd[1]: Reached target Path Units. Mar 21 14:02:33 localhost systemd[1]: Reached target Slice Units. Mar 21 14:02:33 localhost systemd[1]: Reached target Swaps. Mar 21 14:02:33 localhost systemd[1]: Reached target Timer Units. Mar 21 14:02:33 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Mar 21 14:02:33 localhost systemd[1]: Listening on Journal Socket (/dev/log). Mar 21 14:02:33 localhost systemd[1]: Listening on Journal Socket. Mar 21 14:02:33 localhost systemd[1]: Listening on udev Control Socket. Mar 21 14:02:33 localhost systemd[1]: Listening on udev Kernel Socket. Mar 21 14:02:33 localhost systemd[1]: Reached target Socket Units. Mar 21 14:02:33 localhost systemd[1]: Starting Create List of Static Device Nodes... Mar 21 14:02:33 localhost systemd[1]: Starting Journal Service... Mar 21 14:02:33 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Mar 21 14:02:33 localhost systemd[1]: Starting Apply Kernel Variables... Mar 21 14:02:33 localhost systemd[1]: Starting Create System Users... Mar 21 14:02:33 localhost systemd[1]: Starting Setup Virtual Console... Mar 21 14:02:33 localhost systemd[1]: Finished Create List of Static Device Nodes. Mar 21 14:02:33 localhost systemd-journald[308]: Journal started Mar 21 14:02:33 localhost systemd-journald[308]: Runtime Journal (/run/log/journal/434a273e7412473a9c4ed3c673b146b1) is 8.0M, max 153.6M, 145.6M free. Mar 21 14:02:33 localhost systemd[1]: Started Journal Service. Mar 21 14:02:33 localhost systemd[1]: Finished Apply Kernel Variables. Mar 21 14:02:33 localhost systemd-sysusers[312]: Creating group 'users' with GID 100. Mar 21 14:02:33 localhost systemd-sysusers[312]: Creating group 'dbus' with GID 81. Mar 21 14:02:33 localhost systemd-sysusers[312]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Mar 21 14:02:33 localhost systemd[1]: Finished Create System Users. Mar 21 14:02:33 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Mar 21 14:02:33 localhost systemd[1]: Starting Create Volatile Files and Directories... Mar 21 14:02:33 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Mar 21 14:02:33 localhost systemd[1]: Finished Create Volatile Files and Directories. Mar 21 14:02:33 localhost systemd[1]: Finished Setup Virtual Console. Mar 21 14:02:33 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Mar 21 14:02:33 localhost systemd[1]: Starting dracut cmdline hook... Mar 21 14:02:33 localhost dracut-cmdline[330]: dracut-9 dracut-057-110.git20260130.el9 Mar 21 14:02:33 localhost dracut-cmdline[330]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-687.el9.x86_64 root=UUID=97c78989-359a-4bad-a2f1-e793fa797b35 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Mar 21 14:02:33 localhost systemd[1]: Finished dracut cmdline hook. Mar 21 14:02:33 localhost systemd[1]: Starting dracut pre-udev hook... Mar 21 14:02:33 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 21 14:02:33 localhost kernel: device-mapper: uevent: version 1.0.3 Mar 21 14:02:33 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Mar 21 14:02:33 localhost kernel: RPC: Registered named UNIX socket transport module. Mar 21 14:02:33 localhost kernel: RPC: Registered udp transport module. Mar 21 14:02:33 localhost kernel: RPC: Registered tcp transport module. Mar 21 14:02:33 localhost kernel: RPC: Registered tcp-with-tls transport module. Mar 21 14:02:33 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 21 14:02:33 localhost rpc.statd[445]: Version 2.5.4 starting Mar 21 14:02:33 localhost rpc.statd[445]: Initializing NSM state Mar 21 14:02:33 localhost rpc.idmapd[450]: Setting log level to 0 Mar 21 14:02:33 localhost systemd[1]: Finished dracut pre-udev hook. Mar 21 14:02:33 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Mar 21 14:02:33 localhost systemd-udevd[463]: Using default interface naming scheme 'rhel-9.0'. Mar 21 14:02:33 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Mar 21 14:02:33 localhost systemd[1]: Starting dracut pre-trigger hook... Mar 21 14:02:33 localhost systemd[1]: Finished dracut pre-trigger hook. Mar 21 14:02:33 localhost systemd[1]: Starting Coldplug All udev Devices... Mar 21 14:02:33 localhost systemd[1]: Created slice Slice /system/modprobe. Mar 21 14:02:33 localhost systemd[1]: Starting Load Kernel Module configfs... Mar 21 14:02:33 localhost systemd[1]: Finished Coldplug All udev Devices. Mar 21 14:02:33 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 21 14:02:33 localhost systemd[1]: Finished Load Kernel Module configfs. Mar 21 14:02:33 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Mar 21 14:02:33 localhost systemd[1]: Reached target Network. Mar 21 14:02:33 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Mar 21 14:02:33 localhost systemd[1]: Starting dracut initqueue hook... Mar 21 14:02:34 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Mar 21 14:02:34 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Mar 21 14:02:34 localhost kernel: libata version 3.00 loaded. Mar 21 14:02:34 localhost kernel: vda: vda1 Mar 21 14:02:34 localhost kernel: ACPI: bus type drm_connector registered Mar 21 14:02:34 localhost systemd-udevd[500]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:02:34 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Mar 21 14:02:34 localhost kernel: scsi host0: ata_piix Mar 21 14:02:34 localhost kernel: scsi host1: ata_piix Mar 21 14:02:34 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Mar 21 14:02:34 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Mar 21 14:02:34 localhost systemd[1]: Found device /dev/disk/by-uuid/97c78989-359a-4bad-a2f1-e793fa797b35. Mar 21 14:02:34 localhost systemd[1]: Reached target Initrd Root Device. Mar 21 14:02:34 localhost systemd[1]: Mounting Kernel Configuration File System... Mar 21 14:02:34 localhost systemd[1]: Mounted Kernel Configuration File System. Mar 21 14:02:34 localhost systemd[1]: Reached target System Initialization. Mar 21 14:02:34 localhost systemd[1]: Reached target Basic System. Mar 21 14:02:34 localhost kernel: ata1: found unknown device (class 0) Mar 21 14:02:34 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Mar 21 14:02:34 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Mar 21 14:02:34 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Mar 21 14:02:34 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Mar 21 14:02:34 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Mar 21 14:02:34 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Mar 21 14:02:34 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 21 14:02:34 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Mar 21 14:02:34 localhost kernel: Console: switching to colour dummy device 80x25 Mar 21 14:02:34 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Mar 21 14:02:34 localhost kernel: [drm] features: -context_init Mar 21 14:02:34 localhost kernel: [drm] number of scanouts: 1 Mar 21 14:02:34 localhost kernel: [drm] number of cap sets: 0 Mar 21 14:02:34 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Mar 21 14:02:34 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Mar 21 14:02:34 localhost kernel: Console: switching to colour frame buffer device 128x48 Mar 21 14:02:34 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Mar 21 14:02:34 localhost systemd[1]: Finished dracut initqueue hook. Mar 21 14:02:34 localhost systemd[1]: Reached target Preparation for Remote File Systems. Mar 21 14:02:34 localhost systemd[1]: Reached target Remote Encrypted Volumes. Mar 21 14:02:34 localhost systemd[1]: Reached target Remote File Systems. Mar 21 14:02:34 localhost systemd[1]: Starting dracut pre-mount hook... Mar 21 14:02:34 localhost systemd[1]: Finished dracut pre-mount hook. Mar 21 14:02:34 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/97c78989-359a-4bad-a2f1-e793fa797b35... Mar 21 14:02:34 localhost systemd-fsck[564]: /usr/sbin/fsck.xfs: XFS file system. Mar 21 14:02:34 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/97c78989-359a-4bad-a2f1-e793fa797b35. Mar 21 14:02:34 localhost systemd[1]: Mounting /sysroot... Mar 21 14:02:35 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Mar 21 14:02:35 localhost kernel: XFS (vda1): Mounting V5 Filesystem 97c78989-359a-4bad-a2f1-e793fa797b35 Mar 21 14:02:35 localhost kernel: XFS (vda1): Ending clean mount Mar 21 14:02:35 localhost systemd[1]: Mounted /sysroot. Mar 21 14:02:35 localhost systemd[1]: Reached target Initrd Root File System. Mar 21 14:02:35 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Mar 21 14:02:35 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Mar 21 14:02:35 localhost systemd[1]: Reached target Initrd File Systems. Mar 21 14:02:35 localhost systemd[1]: Reached target Initrd Default Target. Mar 21 14:02:35 localhost systemd[1]: Starting dracut mount hook... Mar 21 14:02:35 localhost systemd[1]: Finished dracut mount hook. Mar 21 14:02:35 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Mar 21 14:02:35 localhost rpc.idmapd[450]: exiting on signal 15 Mar 21 14:02:35 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Mar 21 14:02:35 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Mar 21 14:02:35 localhost systemd[1]: Stopped target Network. Mar 21 14:02:35 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Mar 21 14:02:35 localhost systemd[1]: Stopped target Timer Units. Mar 21 14:02:35 localhost systemd[1]: dbus.socket: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Mar 21 14:02:35 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Mar 21 14:02:35 localhost systemd[1]: Stopped target Initrd Default Target. Mar 21 14:02:35 localhost systemd[1]: Stopped target Basic System. Mar 21 14:02:35 localhost systemd[1]: Stopped target Initrd Root Device. Mar 21 14:02:35 localhost systemd[1]: Stopped target Initrd /usr File System. Mar 21 14:02:35 localhost systemd[1]: Stopped target Path Units. Mar 21 14:02:35 localhost systemd[1]: Stopped target Remote File Systems. Mar 21 14:02:35 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Mar 21 14:02:35 localhost systemd[1]: Stopped target Slice Units. Mar 21 14:02:35 localhost systemd[1]: Stopped target Socket Units. Mar 21 14:02:35 localhost systemd[1]: Stopped target System Initialization. Mar 21 14:02:35 localhost systemd[1]: Stopped target Local File Systems. Mar 21 14:02:35 localhost systemd[1]: Stopped target Swaps. Mar 21 14:02:35 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped dracut mount hook. Mar 21 14:02:35 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped dracut pre-mount hook. Mar 21 14:02:35 localhost systemd[1]: Stopped target Local Encrypted Volumes. Mar 21 14:02:35 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Mar 21 14:02:35 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped dracut initqueue hook. Mar 21 14:02:35 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Apply Kernel Variables. Mar 21 14:02:35 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Create Volatile Files and Directories. Mar 21 14:02:35 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Coldplug All udev Devices. Mar 21 14:02:35 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped dracut pre-trigger hook. Mar 21 14:02:35 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Mar 21 14:02:35 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Setup Virtual Console. Mar 21 14:02:35 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Mar 21 14:02:35 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Mar 21 14:02:35 localhost systemd[1]: systemd-udevd.service: Consumed 1.299s CPU time. Mar 21 14:02:35 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Closed udev Control Socket. Mar 21 14:02:35 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Closed udev Kernel Socket. Mar 21 14:02:35 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped dracut pre-udev hook. Mar 21 14:02:35 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped dracut cmdline hook. Mar 21 14:02:35 localhost systemd[1]: Starting Cleanup udev Database... Mar 21 14:02:35 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Mar 21 14:02:35 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Create List of Static Device Nodes. Mar 21 14:02:35 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Stopped Create System Users. Mar 21 14:02:35 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 21 14:02:35 localhost systemd[1]: Finished Cleanup udev Database. Mar 21 14:02:35 localhost systemd[1]: Reached target Switch Root. Mar 21 14:02:35 localhost systemd[1]: Starting Switch Root... Mar 21 14:02:35 localhost systemd[1]: Switching root. Mar 21 14:02:35 localhost systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Mar 21 14:02:35 localhost systemd-journald[308]: Journal stopped Mar 21 14:02:36 localhost kernel: audit: type=1404 audit(1774116155.689:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Mar 21 14:02:36 localhost kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:02:36 localhost kernel: SELinux: policy capability open_perms=1 Mar 21 14:02:36 localhost kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:02:36 localhost kernel: SELinux: policy capability always_check_network=0 Mar 21 14:02:36 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:02:36 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:02:36 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:02:36 localhost kernel: audit: type=1403 audit(1774116155.811:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 21 14:02:36 localhost systemd[1]: Successfully loaded SELinux policy in 124.437ms. Mar 21 14:02:36 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 33.274ms. Mar 21 14:02:36 localhost systemd[1]: systemd 252-67.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 21 14:02:36 localhost systemd[1]: Detected virtualization kvm. Mar 21 14:02:36 localhost systemd[1]: Detected architecture x86-64. Mar 21 14:02:36 localhost systemd-rc-local-generator[650]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:02:36 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 21 14:02:36 localhost systemd[1]: Stopped Switch Root. Mar 21 14:02:36 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 21 14:02:36 localhost systemd[1]: Created slice Slice /system/getty. Mar 21 14:02:36 localhost systemd[1]: Created slice Slice /system/serial-getty. Mar 21 14:02:36 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Mar 21 14:02:36 localhost systemd[1]: Created slice User and Session Slice. Mar 21 14:02:36 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Mar 21 14:02:36 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Mar 21 14:02:36 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Mar 21 14:02:36 localhost systemd[1]: Reached target Local Encrypted Volumes. Mar 21 14:02:36 localhost systemd[1]: Stopped target Switch Root. Mar 21 14:02:36 localhost systemd[1]: Stopped target Initrd File Systems. Mar 21 14:02:36 localhost systemd[1]: Stopped target Initrd Root File System. Mar 21 14:02:36 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Mar 21 14:02:36 localhost systemd[1]: Reached target Path Units. Mar 21 14:02:36 localhost systemd[1]: Reached target rpc_pipefs.target. Mar 21 14:02:36 localhost systemd[1]: Reached target Slice Units. Mar 21 14:02:36 localhost systemd[1]: Reached target Swaps. Mar 21 14:02:36 localhost systemd[1]: Reached target Local Verity Protected Volumes. Mar 21 14:02:36 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Mar 21 14:02:36 localhost systemd[1]: Reached target RPC Port Mapper. Mar 21 14:02:36 localhost systemd[1]: Listening on Process Core Dump Socket. Mar 21 14:02:36 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Mar 21 14:02:36 localhost systemd[1]: Listening on udev Control Socket. Mar 21 14:02:36 localhost systemd[1]: Listening on udev Kernel Socket. Mar 21 14:02:36 localhost systemd[1]: Mounting Huge Pages File System... Mar 21 14:02:36 localhost systemd[1]: Mounting POSIX Message Queue File System... Mar 21 14:02:36 localhost systemd[1]: Mounting Kernel Debug File System... Mar 21 14:02:36 localhost systemd[1]: Mounting Kernel Trace File System... Mar 21 14:02:36 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 21 14:02:36 localhost systemd[1]: Starting Create List of Static Device Nodes... Mar 21 14:02:36 localhost systemd[1]: Starting Load Kernel Module configfs... Mar 21 14:02:36 localhost systemd[1]: Starting Load Kernel Module drm... Mar 21 14:02:36 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Mar 21 14:02:36 localhost systemd[1]: Starting Load Kernel Module fuse... Mar 21 14:02:36 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Mar 21 14:02:36 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 21 14:02:36 localhost systemd[1]: Stopped File System Check on Root Device. Mar 21 14:02:36 localhost systemd[1]: Stopped Journal Service. Mar 21 14:02:36 localhost systemd[1]: Starting Journal Service... Mar 21 14:02:36 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Mar 21 14:02:36 localhost systemd[1]: Starting Generate network units from Kernel command line... Mar 21 14:02:36 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 21 14:02:36 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Mar 21 14:02:36 localhost systemd-journald[698]: Journal started Mar 21 14:02:36 localhost systemd-journald[698]: Runtime Journal (/run/log/journal/a37cfc0acf5d73c25d167f6ff0322475) is 8.0M, max 153.6M, 145.6M free. Mar 21 14:02:36 localhost systemd[1]: Queued start job for default target Multi-User System. Mar 21 14:02:36 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Mar 21 14:02:36 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Mar 21 14:02:36 localhost systemd[1]: Starting Apply Kernel Variables... Mar 21 14:02:36 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Mar 21 14:02:36 localhost systemd[1]: Starting Coldplug All udev Devices... Mar 21 14:02:36 localhost kernel: fuse: init (API version 7.37) Mar 21 14:02:36 localhost systemd[1]: Started Journal Service. Mar 21 14:02:36 localhost systemd[1]: Mounted Huge Pages File System. Mar 21 14:02:36 localhost systemd[1]: Mounted POSIX Message Queue File System. Mar 21 14:02:36 localhost systemd[1]: Mounted Kernel Debug File System. Mar 21 14:02:36 localhost systemd[1]: Mounted Kernel Trace File System. Mar 21 14:02:36 localhost systemd[1]: Finished Create List of Static Device Nodes. Mar 21 14:02:36 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 21 14:02:36 localhost systemd[1]: Finished Load Kernel Module configfs. Mar 21 14:02:36 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 21 14:02:36 localhost systemd[1]: Finished Load Kernel Module drm. Mar 21 14:02:36 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 21 14:02:36 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Mar 21 14:02:36 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 21 14:02:36 localhost systemd[1]: Finished Load Kernel Module fuse. Mar 21 14:02:36 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Mar 21 14:02:36 localhost systemd[1]: Finished Generate network units from Kernel command line. Mar 21 14:02:36 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Mar 21 14:02:36 localhost systemd[1]: Finished Apply Kernel Variables. Mar 21 14:02:36 localhost systemd[1]: Mounting FUSE Control File System... Mar 21 14:02:36 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 21 14:02:36 localhost systemd[1]: Starting Rebuild Hardware Database... Mar 21 14:02:36 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Mar 21 14:02:36 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 21 14:02:36 localhost systemd[1]: Starting Load/Save OS Random Seed... Mar 21 14:02:36 localhost systemd[1]: Starting Create System Users... Mar 21 14:02:36 localhost systemd[1]: Mounted FUSE Control File System. Mar 21 14:02:36 localhost systemd-journald[698]: Runtime Journal (/run/log/journal/a37cfc0acf5d73c25d167f6ff0322475) is 8.0M, max 153.6M, 145.6M free. Mar 21 14:02:36 localhost systemd-journald[698]: Received client request to flush runtime journal. Mar 21 14:02:36 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Mar 21 14:02:36 localhost systemd[1]: Finished Load/Save OS Random Seed. Mar 21 14:02:36 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Mar 21 14:02:36 localhost systemd[1]: Finished Coldplug All udev Devices. Mar 21 14:02:36 localhost systemd[1]: Finished Create System Users. Mar 21 14:02:36 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Mar 21 14:02:36 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Mar 21 14:02:36 localhost systemd[1]: Reached target Preparation for Local File Systems. Mar 21 14:02:36 localhost systemd[1]: Reached target Local File Systems. Mar 21 14:02:36 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Mar 21 14:02:36 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Mar 21 14:02:36 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Mar 21 14:02:36 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Mar 21 14:02:36 localhost systemd[1]: Starting Automatic Boot Loader Update... Mar 21 14:02:36 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Mar 21 14:02:36 localhost systemd[1]: Starting Create Volatile Files and Directories... Mar 21 14:02:36 localhost bootctl[716]: Couldn't find EFI system partition, skipping. Mar 21 14:02:36 localhost systemd[1]: Finished Automatic Boot Loader Update. Mar 21 14:02:36 localhost systemd[1]: Finished Create Volatile Files and Directories. Mar 21 14:02:36 localhost systemd[1]: Starting Security Auditing Service... Mar 21 14:02:36 localhost systemd[1]: Starting RPC Bind... Mar 21 14:02:36 localhost systemd[1]: Starting Rebuild Journal Catalog... Mar 21 14:02:36 localhost auditd[722]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Mar 21 14:02:36 localhost auditd[722]: Init complete, auditd 3.1.5 listening for events (startup state enable) Mar 21 14:02:36 localhost systemd[1]: Finished Rebuild Journal Catalog. Mar 21 14:02:37 localhost systemd[1]: Started RPC Bind. Mar 21 14:02:37 localhost augenrules[727]: /sbin/augenrules: No change Mar 21 14:02:37 localhost augenrules[742]: No rules Mar 21 14:02:37 localhost augenrules[742]: enabled 1 Mar 21 14:02:37 localhost augenrules[742]: failure 1 Mar 21 14:02:37 localhost augenrules[742]: pid 722 Mar 21 14:02:37 localhost augenrules[742]: rate_limit 0 Mar 21 14:02:37 localhost augenrules[742]: backlog_limit 8192 Mar 21 14:02:37 localhost augenrules[742]: lost 0 Mar 21 14:02:37 localhost augenrules[742]: backlog 3 Mar 21 14:02:37 localhost augenrules[742]: backlog_wait_time 60000 Mar 21 14:02:37 localhost augenrules[742]: backlog_wait_time_actual 0 Mar 21 14:02:37 localhost augenrules[742]: enabled 1 Mar 21 14:02:37 localhost augenrules[742]: failure 1 Mar 21 14:02:37 localhost augenrules[742]: pid 722 Mar 21 14:02:37 localhost augenrules[742]: rate_limit 0 Mar 21 14:02:37 localhost augenrules[742]: backlog_limit 8192 Mar 21 14:02:37 localhost augenrules[742]: lost 0 Mar 21 14:02:37 localhost augenrules[742]: backlog 3 Mar 21 14:02:37 localhost augenrules[742]: backlog_wait_time 60000 Mar 21 14:02:37 localhost augenrules[742]: backlog_wait_time_actual 0 Mar 21 14:02:37 localhost augenrules[742]: enabled 1 Mar 21 14:02:37 localhost augenrules[742]: failure 1 Mar 21 14:02:37 localhost augenrules[742]: pid 722 Mar 21 14:02:37 localhost augenrules[742]: rate_limit 0 Mar 21 14:02:37 localhost augenrules[742]: backlog_limit 8192 Mar 21 14:02:37 localhost augenrules[742]: lost 0 Mar 21 14:02:37 localhost augenrules[742]: backlog 3 Mar 21 14:02:37 localhost augenrules[742]: backlog_wait_time 60000 Mar 21 14:02:37 localhost augenrules[742]: backlog_wait_time_actual 0 Mar 21 14:02:37 localhost systemd[1]: Started Security Auditing Service. Mar 21 14:02:37 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Mar 21 14:02:37 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Mar 21 14:02:37 localhost systemd[1]: Finished Rebuild Hardware Database. Mar 21 14:02:37 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Mar 21 14:02:37 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Mar 21 14:02:37 localhost systemd-udevd[750]: Using default interface naming scheme 'rhel-9.0'. Mar 21 14:02:37 localhost systemd[1]: Starting Update is Completed... Mar 21 14:02:37 localhost systemd[1]: Finished Update is Completed. Mar 21 14:02:37 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Mar 21 14:02:37 localhost systemd[1]: Reached target System Initialization. Mar 21 14:02:37 localhost systemd[1]: Started dnf makecache --timer. Mar 21 14:02:37 localhost systemd[1]: Started Daily rotation of log files. Mar 21 14:02:37 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Mar 21 14:02:37 localhost systemd[1]: Reached target Timer Units. Mar 21 14:02:37 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Mar 21 14:02:37 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Mar 21 14:02:37 localhost systemd[1]: Reached target Socket Units. Mar 21 14:02:37 localhost systemd[1]: Starting D-Bus System Message Bus... Mar 21 14:02:37 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 21 14:02:37 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Mar 21 14:02:37 localhost systemd[1]: Starting Load Kernel Module configfs... Mar 21 14:02:37 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 21 14:02:37 localhost systemd[1]: Finished Load Kernel Module configfs. Mar 21 14:02:37 localhost systemd-udevd[758]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:02:37 localhost systemd[1]: Started D-Bus System Message Bus. Mar 21 14:02:37 localhost systemd[1]: Reached target Basic System. Mar 21 14:02:37 localhost dbus-broker-lau[786]: Ready Mar 21 14:02:37 localhost systemd[1]: Starting NTP client/server... Mar 21 14:02:37 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Mar 21 14:02:37 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Mar 21 14:02:37 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Mar 21 14:02:37 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Mar 21 14:02:37 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Mar 21 14:02:37 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Mar 21 14:02:37 localhost systemd[1]: Starting IPv4 firewall with iptables... Mar 21 14:02:37 localhost systemd[1]: Started irqbalance daemon. Mar 21 14:02:37 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Mar 21 14:02:37 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 21 14:02:37 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 21 14:02:37 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 21 14:02:37 localhost systemd[1]: Reached target sshd-keygen.target. Mar 21 14:02:37 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Mar 21 14:02:37 localhost systemd[1]: Reached target User and Group Name Lookups. Mar 21 14:02:37 localhost systemd[1]: Starting User Login Management... Mar 21 14:02:37 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Mar 21 14:02:37 localhost chronyd[815]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Mar 21 14:02:37 localhost chronyd[815]: Loaded 0 symmetric keys Mar 21 14:02:37 localhost chronyd[815]: Using right/UTC timezone to obtain leap second data Mar 21 14:02:37 localhost chronyd[815]: Loaded seccomp filter (level 2) Mar 21 14:02:37 localhost systemd[1]: Started NTP client/server. Mar 21 14:02:37 localhost systemd-logind[807]: New seat seat0. Mar 21 14:02:37 localhost systemd-logind[807]: Watching system buttons on /dev/input/event0 (Power Button) Mar 21 14:02:37 localhost systemd-logind[807]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Mar 21 14:02:37 localhost systemd[1]: Started User Login Management. Mar 21 14:02:37 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Mar 21 14:02:37 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Mar 21 14:02:37 localhost kernel: kvm_amd: TSC scaling supported Mar 21 14:02:37 localhost kernel: kvm_amd: Nested Virtualization enabled Mar 21 14:02:37 localhost kernel: kvm_amd: Nested Paging enabled Mar 21 14:02:37 localhost kernel: kvm_amd: LBR virtualization supported Mar 21 14:02:37 localhost iptables.init[801]: iptables: Applying firewall rules: [ OK ] Mar 21 14:02:37 localhost systemd[1]: Finished IPv4 firewall with iptables. Mar 21 14:02:38 localhost cloud-init[853]: Cloud-init v. 24.4-8.el9 running 'init-local' at Sat, 21 Mar 2026 18:02:38 +0000. Up 6.66 seconds. Mar 21 14:02:38 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Mar 21 14:02:38 localhost kernel: ISO 9660 Extensions: RRIP_1991A Mar 21 14:02:38 localhost systemd[1]: run-cloud\x2dinit-tmp-tmppar20jnb.mount: Deactivated successfully. Mar 21 14:02:38 localhost systemd[1]: Starting Hostname Service... Mar 21 14:02:38 localhost systemd[1]: Started Hostname Service. Mar 21 14:02:38 np0005654373.novalocal systemd-hostnamed[867]: Hostname set to (static) Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Reached target Preparation for Network. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Starting Network Manager... Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7101] NetworkManager (version 1.54.3-2.el9) is starting... (boot:76172d3d-e0bb-416d-9b04-f8a5ddbaaa64) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7107] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7268] manager[0x558fb247c000]: monitoring kernel firmware directory '/lib/firmware'. Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7333] hostname: hostname: using hostnamed Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7334] hostname: static hostname changed from (none) to "np0005654373.novalocal" Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7340] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7436] manager[0x558fb247c000]: rfkill: Wi-Fi hardware radio set enabled Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7437] manager[0x558fb247c000]: rfkill: WWAN hardware radio set enabled Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7534] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7535] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7535] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7535] manager: Networking is enabled by state file Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7537] settings: Loaded settings plugin: keyfile (internal) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7569] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7593] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7607] dhcp: init: Using DHCP client 'internal' Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7610] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7621] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7632] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7643] device (lo): Activation: starting connection 'lo' (164d8e2b-97f6-44f5-86bd-bcf86052fee8) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7651] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7652] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7679] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7683] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7685] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7687] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7688] device (eth0): carrier: link connected Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7690] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7696] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7701] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7705] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7706] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7709] manager: NetworkManager state is now CONNECTING Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7710] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7716] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7718] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7760] dhcp4 (eth0): state changed new lease, address=38.102.83.12 Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7766] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.7782] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Started Network Manager. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Reached target Network. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Starting Network Manager Wait Online... Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8168] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8170] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8174] device (lo): Activation: successful, device activated. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8183] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8184] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8186] manager: NetworkManager state is now CONNECTED_SITE Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8188] device (eth0): Activation: successful, device activated. Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8193] manager: NetworkManager state is now CONNECTED_GLOBAL Mar 21 14:02:38 np0005654373.novalocal NetworkManager[871]: [1774116158.8197] manager: startup complete Mar 21 14:02:38 np0005654373.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Reached target NFS client services. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Reached target Remote File Systems. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Finished Network Manager Wait Online. Mar 21 14:02:38 np0005654373.novalocal systemd[1]: Starting Cloud-init: Network Stage... Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: Cloud-init v. 24.4-8.el9 running 'init' at Sat, 21 Mar 2026 18:02:39 +0000. Up 7.64 seconds. Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | eth0 | True | 38.102.83.12 | 255.255.255.0 | global | fa:16:3e:42:d8:17 | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | eth0 | True | fe80::f816:3eff:fe42:d817/64 | . | link | fa:16:3e:42:d8:17 | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | lo | True | ::1/128 | . | host | . | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +-------+-------------+---------+-----------+-------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | Route | Destination | Gateway | Interface | Flags | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +-------+-------------+---------+-----------+-------+ Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: | 3 | multicast | :: | eth0 | U | Mar 21 14:02:39 np0005654373.novalocal cloud-init[934]: ci-info: +-------+-------------+---------+-----------+-------+ Mar 21 14:02:39 np0005654373.novalocal useradd[1000]: new group: name=cloud-user, GID=1001 Mar 21 14:02:39 np0005654373.novalocal useradd[1000]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Mar 21 14:02:39 np0005654373.novalocal useradd[1000]: add 'cloud-user' to group 'adm' Mar 21 14:02:39 np0005654373.novalocal useradd[1000]: add 'cloud-user' to group 'systemd-journal' Mar 21 14:02:39 np0005654373.novalocal useradd[1000]: add 'cloud-user' to shadow group 'adm' Mar 21 14:02:39 np0005654373.novalocal useradd[1000]: add 'cloud-user' to shadow group 'systemd-journal' Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Generating public/private rsa key pair. Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: The key fingerprint is: Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: SHA256:mMzvVTjM0l+2P/kCnVqJeyFCEYIsyg8TjKllid0ZvTc root@np0005654373.novalocal Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: The key's randomart image is: Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: +---[RSA 3072]----+ Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | * o.= .. .. | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: |+ B + + .. | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: |.+ o . . . | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: |. = o.oE+.. | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | + =.So* .ooo | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | . . ..++o*. | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | . ...*...| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | . . o o+ | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | . . .=| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: +----[SHA256]-----+ Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Generating public/private ecdsa key pair. Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: The key fingerprint is: Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: SHA256:eiF+DADSlPnKqX53jKGMumd5g3+vZiqJObbjNOKxXxE root@np0005654373.novalocal Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: The key's randomart image is: Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: +---[ECDSA 256]---+ Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: |.ooo | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | .+. | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | ..E | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | ... | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | . o .o S | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | + o.= . | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: |.Bo+..* + | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: |O+@++o+= | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: |B@==+*oo. | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: +----[SHA256]-----+ Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Generating public/private ed25519 key pair. Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: The key fingerprint is: Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: SHA256:i9bGcJf/z/Q5xDsNicezfkRUa1AuBeMAFpeiafbpWAw root@np0005654373.novalocal Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: The key's randomart image is: Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: +--[ED25519 256]--+ Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | +oo.+ooo| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | ....o = o| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | o . o = | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | E . o .| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | + S + o.o | Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | * B .. *o.| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | o O ...=+| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | . o . ..*=| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: | .o+*| Mar 21 14:02:40 np0005654373.novalocal cloud-init[934]: +----[SHA256]-----+ Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Finished Cloud-init: Network Stage. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Reached target Cloud-config availability. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Reached target Network is Online. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting Cloud-init: Config Stage... Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting Crash recovery kernel arming... Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting Notify NFS peers of a restart... Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting System Logging Service... Mar 21 14:02:40 np0005654373.novalocal sm-notify[1016]: Version 2.5.4 starting Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting OpenSSH server daemon... Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting Permit User Sessions... Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Started Notify NFS peers of a restart. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Finished Permit User Sessions. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Started Command Scheduler. Mar 21 14:02:40 np0005654373.novalocal sshd[1018]: Server listening on 0.0.0.0 port 22. Mar 21 14:02:40 np0005654373.novalocal sshd[1018]: Server listening on :: port 22. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Started Getty on tty1. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Started Serial Getty on ttyS0. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Reached target Login Prompts. Mar 21 14:02:40 np0005654373.novalocal crond[1021]: (CRON) STARTUP (1.5.7) Mar 21 14:02:40 np0005654373.novalocal crond[1021]: (CRON) INFO (Syslog will be used instead of sendmail.) Mar 21 14:02:40 np0005654373.novalocal crond[1021]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 91% if used.) Mar 21 14:02:40 np0005654373.novalocal crond[1021]: (CRON) INFO (running with inotify support) Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Started OpenSSH server daemon. Mar 21 14:02:40 np0005654373.novalocal sshd-session[1023]: Connection reset by 38.102.83.114 port 46492 [preauth] Mar 21 14:02:40 np0005654373.novalocal rsyslogd[1017]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1017" x-info="https://www.rsyslog.com"] start Mar 21 14:02:40 np0005654373.novalocal rsyslogd[1017]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Started System Logging Service. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Reached target Multi-User System. Mar 21 14:02:40 np0005654373.novalocal sshd-session[1034]: Unable to negotiate with 38.102.83.114 port 46504: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Mar 21 14:02:40 np0005654373.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Mar 21 14:02:40 np0005654373.novalocal sshd-session[1061]: Unable to negotiate with 38.102.83.114 port 46514: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Mar 21 14:02:40 np0005654373.novalocal sshd-session[1071]: Unable to negotiate with 38.102.83.114 port 46528: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Mar 21 14:02:40 np0005654373.novalocal rsyslogd[1017]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Mar 21 14:02:40 np0005654373.novalocal sshd-session[1106]: Unable to negotiate with 38.102.83.114 port 46556: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Mar 21 14:02:40 np0005654373.novalocal sshd-session[1121]: Unable to negotiate with 38.102.83.114 port 46560: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Mar 21 14:02:40 np0005654373.novalocal sshd-session[1049]: Connection closed by 38.102.83.114 port 46508 [preauth] Mar 21 14:02:40 np0005654373.novalocal sshd-session[1076]: Connection closed by 38.102.83.114 port 46544 [preauth] Mar 21 14:02:40 np0005654373.novalocal sshd-session[1088]: Connection closed by 38.102.83.114 port 46552 [preauth] Mar 21 14:02:40 np0005654373.novalocal cloud-init[1162]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Sat, 21 Mar 2026 18:02:40 +0000. Up 9.17 seconds. Mar 21 14:02:40 np0005654373.novalocal kdumpctl[1028]: kdump: No kdump initial ramdisk found. Mar 21 14:02:40 np0005654373.novalocal kdumpctl[1028]: kdump: Rebuilding /boot/initramfs-5.14.0-687.el9.x86_64kdump.img Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Finished Cloud-init: Config Stage. Mar 21 14:02:40 np0005654373.novalocal systemd[1]: Starting Cloud-init: Final Stage... Mar 21 14:02:41 np0005654373.novalocal cloud-init[1430]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Sat, 21 Mar 2026 18:02:41 +0000. Up 9.57 seconds. Mar 21 14:02:41 np0005654373.novalocal cloud-init[1475]: ############################################################# Mar 21 14:02:41 np0005654373.novalocal cloud-init[1478]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Mar 21 14:02:41 np0005654373.novalocal cloud-init[1485]: 256 SHA256:eiF+DADSlPnKqX53jKGMumd5g3+vZiqJObbjNOKxXxE root@np0005654373.novalocal (ECDSA) Mar 21 14:02:41 np0005654373.novalocal cloud-init[1491]: 256 SHA256:i9bGcJf/z/Q5xDsNicezfkRUa1AuBeMAFpeiafbpWAw root@np0005654373.novalocal (ED25519) Mar 21 14:02:41 np0005654373.novalocal cloud-init[1497]: 3072 SHA256:mMzvVTjM0l+2P/kCnVqJeyFCEYIsyg8TjKllid0ZvTc root@np0005654373.novalocal (RSA) Mar 21 14:02:41 np0005654373.novalocal cloud-init[1500]: -----END SSH HOST KEY FINGERPRINTS----- Mar 21 14:02:41 np0005654373.novalocal cloud-init[1504]: ############################################################# Mar 21 14:02:41 np0005654373.novalocal cloud-init[1430]: Cloud-init v. 24.4-8.el9 finished at Sat, 21 Mar 2026 18:02:41 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.75 seconds Mar 21 14:02:41 np0005654373.novalocal dracut[1540]: dracut-057-110.git20260130.el9 Mar 21 14:02:41 np0005654373.novalocal systemd[1]: Finished Cloud-init: Final Stage. Mar 21 14:02:41 np0005654373.novalocal systemd[1]: Reached target Cloud-init target. Mar 21 14:02:41 np0005654373.novalocal dracut[1542]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/97c78989-359a-4bad-a2f1-e793fa797b35 /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-687.el9.x86_64kdump.img 5.14.0-687.el9.x86_64 Mar 21 14:02:41 np0005654373.novalocal dracut[1542]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Mar 21 14:02:41 np0005654373.novalocal dracut[1542]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Mar 21 14:02:41 np0005654373.novalocal dracut[1542]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Mar 21 14:02:41 np0005654373.novalocal dracut[1542]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Mar 21 14:02:41 np0005654373.novalocal dracut[1542]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: Module 'resume' will not be installed, because it's in the list to be omitted! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: memstrack is not available Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Mar 21 14:02:42 np0005654373.novalocal dracut[1542]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: memstrack is not available Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: *** Including module: systemd *** Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: *** Including module: fips *** Mar 21 14:02:43 np0005654373.novalocal chronyd[815]: Selected source 198.181.199.86 (2.centos.pool.ntp.org) Mar 21 14:02:43 np0005654373.novalocal chronyd[815]: System clock TAI offset set to 37 seconds Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: *** Including module: systemd-initrd *** Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: *** Including module: i18n *** Mar 21 14:02:43 np0005654373.novalocal dracut[1542]: *** Including module: drm *** Mar 21 14:02:44 np0005654373.novalocal dracut[1542]: *** Including module: prefixdevname *** Mar 21 14:02:44 np0005654373.novalocal dracut[1542]: *** Including module: kernel-modules *** Mar 21 14:02:44 np0005654373.novalocal kernel: block vda: the capability attribute has been deprecated. Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: kernel-modules-extra *** Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: qemu *** Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: fstab-sys *** Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: rootfs-block *** Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: terminfo *** Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: udev-rules *** Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: Skipping udev rule: 91-permissions.rules Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: Skipping udev rule: 80-drivers-modprobe.rules Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: virtiofs *** Mar 21 14:02:45 np0005654373.novalocal dracut[1542]: *** Including module: dracut-systemd *** Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: *** Including module: usrmount *** Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: *** Including module: base *** Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: *** Including module: fs-lib *** Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: *** Including module: kdumpbase *** Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: *** Including module: microcode_ctl-fw_dir_override *** Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: microcode_ctl module: mangling fw_dir Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel" is ignored Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-2d-07" is ignored Mar 21 14:02:46 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-4e-03" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-4f-01" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-55-04" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-5e-03" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-8c-01" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: configuration "intel-06-8f-08" is ignored Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: *** Including module: openssl *** Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: *** Including module: shutdown *** Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: *** Including module: squash *** Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 25 affinity: Operation not permitted Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: IRQ 25 affinity is now unmanaged Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 31 affinity: Operation not permitted Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: IRQ 31 affinity is now unmanaged Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 28 affinity: Operation not permitted Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: IRQ 28 affinity is now unmanaged Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 32 affinity: Operation not permitted Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: IRQ 32 affinity is now unmanaged Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 30 affinity: Operation not permitted Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: IRQ 30 affinity is now unmanaged Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 29 affinity: Operation not permitted Mar 21 14:02:47 np0005654373.novalocal irqbalance[805]: IRQ 29 affinity is now unmanaged Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: *** Including modules done *** Mar 21 14:02:47 np0005654373.novalocal dracut[1542]: *** Installing kernel module dependencies *** Mar 21 14:02:48 np0005654373.novalocal dracut[1542]: *** Installing kernel module dependencies done *** Mar 21 14:02:48 np0005654373.novalocal dracut[1542]: *** Resolving executable dependencies *** Mar 21 14:02:48 np0005654373.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Mar 21 14:02:49 np0005654373.novalocal sshd-session[4188]: Accepted publickey for zuul-worker from 38.102.83.114 port 51284 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Mar 21 14:02:49 np0005654373.novalocal systemd[1]: Created slice User Slice of UID 1000. Mar 21 14:02:49 np0005654373.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Mar 21 14:02:49 np0005654373.novalocal systemd-logind[807]: New session 1 of user zuul-worker. Mar 21 14:02:49 np0005654373.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Mar 21 14:02:49 np0005654373.novalocal systemd[1]: Starting User Manager for UID 1000... Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Mar 21 14:02:49 np0005654373.novalocal dracut[1542]: *** Resolving executable dependencies done *** Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Queued start job for default target Main User Target. Mar 21 14:02:49 np0005654373.novalocal dracut[1542]: *** Generating early-microcode cpio image *** Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Created slice User Application Slice. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Started Mark boot as successful after the user session has run 2 minutes. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Started Daily Cleanup of User's Temporary Directories. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Reached target Paths. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Reached target Timers. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Starting D-Bus User Message Bus Socket... Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Starting Create User's Volatile Files and Directories... Mar 21 14:02:49 np0005654373.novalocal dracut[1542]: *** Store current command line parameters *** Mar 21 14:02:49 np0005654373.novalocal dracut[1542]: Stored kernel commandline: Mar 21 14:02:49 np0005654373.novalocal dracut[1542]: No dracut internal kernel commandline stored in the initramfs Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Finished Create User's Volatile Files and Directories. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Listening on D-Bus User Message Bus Socket. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Reached target Sockets. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Reached target Basic System. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Reached target Main User Target. Mar 21 14:02:49 np0005654373.novalocal systemd[4275]: Startup finished in 133ms. Mar 21 14:02:49 np0005654373.novalocal systemd[1]: Started User Manager for UID 1000. Mar 21 14:02:49 np0005654373.novalocal systemd[1]: Started Session 1 of User zuul-worker. Mar 21 14:02:49 np0005654373.novalocal sshd-session[4188]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Mar 21 14:02:50 np0005654373.novalocal dracut[1542]: *** Install squash loader *** Mar 21 14:02:50 np0005654373.novalocal python3[4536]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 21 14:02:50 np0005654373.novalocal dracut[1542]: *** Squashing the files inside the initramfs *** Mar 21 14:02:51 np0005654373.novalocal python3[4690]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: *** Squashing the files inside the initramfs done *** Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: *** Creating image file '/boot/initramfs-5.14.0-687.el9.x86_64kdump.img' *** Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: *** Hardlinking files *** Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: Mode: real Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: Files: 50 Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: Linked: 0 files Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: Compared: 0 xattrs Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: Compared: 0 files Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: Saved: 0 B Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: Duration: 0.000543 seconds Mar 21 14:02:51 np0005654373.novalocal dracut[1542]: *** Hardlinking files done *** Mar 21 14:02:52 np0005654373.novalocal dracut[1542]: *** Creating initramfs image file '/boot/initramfs-5.14.0-687.el9.x86_64kdump.img' done *** Mar 21 14:02:52 np0005654373.novalocal kdumpctl[1028]: kdump: kexec: loaded kdump kernel Mar 21 14:02:52 np0005654373.novalocal kdumpctl[1028]: kdump: Starting kdump: [OK] Mar 21 14:02:52 np0005654373.novalocal systemd[1]: Finished Crash recovery kernel arming. Mar 21 14:02:52 np0005654373.novalocal systemd[1]: Startup finished in 1.386s (kernel) + 2.822s (initrd) + 17.191s (userspace) = 21.399s. Mar 21 14:02:56 np0005654373.novalocal python3[4963]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 21 14:02:56 np0005654373.novalocal python3[5003]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Mar 21 14:02:58 np0005654373.novalocal python3[5029]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Mar 21 14:02:58 np0005654373.novalocal python3[5053]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:02:58 np0005654373.novalocal python3[5152]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 21 14:02:59 np0005654373.novalocal python3[5223]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1774116178.6353405-163-218861590613483/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=63f5e5416cfd4c42a0918e8b030869f4_id_rsa follow=False checksum=df680e30f87d387f20054bb91d6a00f2a36f9dbf backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:02:59 np0005654373.novalocal python3[5346]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 21 14:03:00 np0005654373.novalocal python3[5417]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1774116179.4357703-174-224991845915530/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=63f5e5416cfd4c42a0918e8b030869f4_id_rsa.pub follow=False checksum=78b5c4f1c6e6de54afe21064da213988cd447e94 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:01 np0005654373.novalocal python3[5465]: ansible-ping Invoked with data=pong Mar 21 14:03:01 np0005654373.novalocal python3[5489]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Mar 21 14:03:03 np0005654373.novalocal python3[5547]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Mar 21 14:03:04 np0005654373.novalocal python3[5579]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:04 np0005654373.novalocal python3[5603]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:04 np0005654373.novalocal python3[5627]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:05 np0005654373.novalocal python3[5651]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:05 np0005654373.novalocal python3[5675]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:05 np0005654373.novalocal python3[5699]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:08 np0005654373.novalocal python3[5723]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Mar 21 14:03:08 np0005654373.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 21 14:03:09 np0005654373.novalocal sshd-session[5728]: Accepted publickey for zuul-worker from 38.102.83.114 port 48406 ssh2: RSA SHA256:o9a15zcuOfNaqRgW1eyP6Ravkn+W6NYCSM8Kpl22pKs Mar 21 14:03:09 np0005654373.novalocal systemd-logind[807]: New session 3 of user zuul-worker. Mar 21 14:03:09 np0005654373.novalocal systemd[1]: Started Session 3 of User zuul-worker. Mar 21 14:03:09 np0005654373.novalocal sshd-session[5728]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Mar 21 14:03:11 np0005654373.novalocal sshd-session[5731]: Received disconnect from 38.102.83.114 port 48406:11: disconnected by user Mar 21 14:03:11 np0005654373.novalocal sshd-session[5731]: Disconnected from user zuul-worker 38.102.83.114 port 48406 Mar 21 14:03:11 np0005654373.novalocal sshd-session[5728]: pam_unix(sshd:session): session closed for user zuul-worker Mar 21 14:03:11 np0005654373.novalocal systemd[1]: session-3.scope: Deactivated successfully. Mar 21 14:03:11 np0005654373.novalocal systemd[1]: session-3.scope: Consumed 1.151s CPU time. Mar 21 14:03:11 np0005654373.novalocal systemd-logind[807]: Session 3 logged out. Waiting for processes to exit. Mar 21 14:03:11 np0005654373.novalocal systemd-logind[807]: Removed session 3. Mar 21 14:03:11 np0005654373.novalocal python3[5779]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:11 np0005654373.novalocal python3[5803]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:12 np0005654373.novalocal python3[5827]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:12 np0005654373.novalocal python3[5851]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:12 np0005654373.novalocal python3[5875]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:12 np0005654373.novalocal python3[5899]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:13 np0005654373.novalocal python3[5924]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163efc-24cc-426c-9767-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:13 np0005654373.novalocal sudo[5925]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Mar 21 14:03:13 np0005654373.novalocal sudo[5925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:13 np0005654373.novalocal sudo[5925]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:13 np0005654373.novalocal python3[5953]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:14 np0005654373.novalocal sudo[6029]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yodgsaqhutonvfgbcnegtayhyxegnein ; /usr/bin/python3' Mar 21 14:03:14 np0005654373.novalocal sudo[6029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:14 np0005654373.novalocal python3[6031]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 21 14:03:14 np0005654373.novalocal sudo[6029]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:14 np0005654373.novalocal sudo[6102]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-veegimlnstigydcxljmljpypxbqhczdm ; /usr/bin/python3' Mar 21 14:03:14 np0005654373.novalocal sudo[6102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:14 np0005654373.novalocal python3[6104]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1774116194.0970137-91-274038629416367/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:14 np0005654373.novalocal sudo[6102]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:17 np0005654373.novalocal sudo[6204]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tqmittadrqvairprxivpfjabcutjuura ; /usr/bin/python3' Mar 21 14:03:17 np0005654373.novalocal sudo[6204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:17 np0005654373.novalocal python3[6206]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 21 14:03:17 np0005654373.novalocal sudo[6204]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:18 np0005654373.novalocal sudo[6279]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-klrciebqypvhtauhubloulurzlbwqzve ; /usr/bin/python3' Mar 21 14:03:18 np0005654373.novalocal sudo[6279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:18 np0005654373.novalocal python3[6281]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1774116196.0314631-103-4066779229975/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:18 np0005654373.novalocal sudo[6279]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:18 np0005654373.novalocal sudo[6381]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zcdhjztgadprlpsxiudtlumcpnnwjrfc ; /usr/bin/python3' Mar 21 14:03:18 np0005654373.novalocal sudo[6381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:18 np0005654373.novalocal python3[6383]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 21 14:03:18 np0005654373.novalocal sudo[6381]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:18 np0005654373.novalocal sudo[6456]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vbneqeicyfubpuvckbgbjvhgprmbvatn ; /usr/bin/python3' Mar 21 14:03:18 np0005654373.novalocal sudo[6456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:19 np0005654373.novalocal python3[6458]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1774116198.4317355-103-57043556491282/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:19 np0005654373.novalocal sudo[6456]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:19 np0005654373.novalocal sudo[6506]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rghgxluwbtaledbdghovltyvppswnffp ; /usr/bin/python3' Mar 21 14:03:19 np0005654373.novalocal sudo[6506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:19 np0005654373.novalocal python3[6508]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:19 np0005654373.novalocal python3[6508]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Mar 21 14:03:19 np0005654373.novalocal sudo[6506]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:19 np0005654373.novalocal sudo[6532]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tflbrchjpijshofapslnjhaodmiwpltw ; /usr/bin/python3' Mar 21 14:03:20 np0005654373.novalocal sudo[6532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:20 np0005654373.novalocal python3[6534]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:20 np0005654373.novalocal sudo[6532]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:20 np0005654373.novalocal sudo[6560]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kdsfbplfesznrbsselsxmxpckdcewhnk ; /usr/bin/python3' Mar 21 14:03:20 np0005654373.novalocal sudo[6560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:20 np0005654373.novalocal python3[6562]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:27 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 26 affinity: Operation not permitted Mar 21 14:03:27 np0005654373.novalocal irqbalance[805]: IRQ 26 affinity is now unmanaged Mar 21 14:03:31 np0005654373.novalocal sudo[6560]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:32 np0005654373.novalocal python3[6603]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:33 np0005654373.novalocal python3[6628]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163efc-24cc-c788-ec7b-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Mar 21 14:03:33 np0005654373.novalocal sudo[6656]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-roottfedsvedbienrwakteczrivcswye ; /usr/bin/python3' Mar 21 14:03:33 np0005654373.novalocal sudo[6656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:34 np0005654373.novalocal python3[6658]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:03:35 np0005654373.novalocal sudo[6656]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:35 np0005654373.novalocal sudo[6683]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jovlthbjposcwxnvgorcckatpaccwjqt ; /usr/bin/python3' Mar 21 14:03:35 np0005654373.novalocal sudo[6683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:35 np0005654373.novalocal python3[6685]: ansible-ansible.legacy.dnf Invoked with name=['python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:03:36 np0005654373.novalocal sudo[6683]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:37 np0005654373.novalocal python3[6717]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163efc-24cc-c788-ec7b-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Mar 21 14:03:38 np0005654373.novalocal python3[6745]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163efc-24cc-c788-ec7b-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Mar 21 14:03:39 np0005654373.novalocal python3[6773]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163efc-24cc-c788-ec7b-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:42 np0005654373.novalocal python3[6805]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163efc-24cc-c788-ec7b-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:45 np0005654373.novalocal python3[6835]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163efc-24cc-c788-ec7b-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:45 np0005654373.novalocal sudo[6862]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-trjbgznfosmfjatwokhiphpwnvqmosbp ; /usr/bin/python3' Mar 21 14:03:45 np0005654373.novalocal sudo[6862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:45 np0005654373.novalocal python3[6864]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:45 np0005654373.novalocal sudo[6862]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:46 np0005654373.novalocal python3[6889]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163efc-24cc-c788-ec7b-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:46 np0005654373.novalocal sudo[6922]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kosepfrpjeyaipyfxqificoyizuafclv ; /usr/bin/python3' Mar 21 14:03:46 np0005654373.novalocal sudo[6922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:46 np0005654373.novalocal python3[6924]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:46 np0005654373.novalocal sudo[6922]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:47 np0005654373.novalocal sudo[7000]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-swjsmrsuvioqzgovvxoguagjicpkyfyq ; /usr/bin/python3' Mar 21 14:03:47 np0005654373.novalocal sudo[7000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:47 np0005654373.novalocal python3[7002]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Mar 21 14:03:47 np0005654373.novalocal sudo[7000]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:47 np0005654373.novalocal sudo[7073]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yirrudcptthxickijyysrqwguyvfibpy ; /usr/bin/python3' Mar 21 14:03:47 np0005654373.novalocal sudo[7073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:47 np0005654373.novalocal python3[7075]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1774116226.796398-84-225371366327252/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Mar 21 14:03:47 np0005654373.novalocal sudo[7073]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:48 np0005654373.novalocal sudo[7124]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cowaixohjigwvyhvkwztpkchteadehsx ; /usr/bin/python3' Mar 21 14:03:48 np0005654373.novalocal sudo[7124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:03:48 np0005654373.novalocal python3[7126]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163efc-24cc-c788-ec7b-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:03:48 np0005654373.novalocal sudo[7124]: pam_unix(sudo:session): session closed for user root Mar 21 14:03:49 np0005654373.novalocal python3[7153]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Mar 21 14:03:56 np0005654373.novalocal python3[7186]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="epoxy" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-epoxy-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163efc-24cc-c788-ec7b-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:04:37 np0005654373.novalocal irqbalance[805]: Cannot change IRQ 27 affinity: Operation not permitted Mar 21 14:04:37 np0005654373.novalocal irqbalance[805]: IRQ 27 affinity is now unmanaged Mar 21 14:04:39 np0005654373.novalocal sshd-session[7293]: Connection reset by authenticating user root 2.57.122.196 port 51758 [preauth] Mar 21 14:05:08 np0005654373.novalocal sudo[7497]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lzlzmmoksvxhsvlivizkhazpjqqexoiw ; /usr/bin/python3' Mar 21 14:05:08 np0005654373.novalocal sudo[7497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:08 np0005654373.novalocal python3[7499]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Mar 21 14:05:08 np0005654373.novalocal sudo[7497]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:09 np0005654373.novalocal sudo[7537]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pcujiuvnfddapfjpvfijsohqsgyzbbjx ; /usr/bin/python3' Mar 21 14:05:09 np0005654373.novalocal sudo[7537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:09 np0005654373.novalocal python3[7539]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:05:09 np0005654373.novalocal python3[7539]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Mar 21 14:05:09 np0005654373.novalocal sudo[7540]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Mar 21 14:05:09 np0005654373.novalocal sudo[7540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:05:09 np0005654373.novalocal sudo[7540]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:09 np0005654373.novalocal sudo[7537]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:09 np0005654373.novalocal sudo[7550]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jfvbvsownyfakkmaenznkcbpuxpagapi ; /usr/bin/python3' Mar 21 14:05:09 np0005654373.novalocal sudo[7550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:09 np0005654373.novalocal python3[7552]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Mar 21 14:05:09 np0005654373.novalocal sudo[7550]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:10 np0005654373.novalocal sudo[7561]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rahfckulfdoxcrluofenotmbaziiyung ; /usr/bin/python3' Mar 21 14:05:10 np0005654373.novalocal sudo[7561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:10 np0005654373.novalocal python3[7563]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:05:11 np0005654373.novalocal sudo[7561]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:11 np0005654373.novalocal sudo[7579]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uxtzfikcwmilqjpclrxwpgxvankelmzm ; /usr/bin/python3' Mar 21 14:05:11 np0005654373.novalocal sudo[7579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:11 np0005654373.novalocal python3[7581]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:05:14 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:05:14 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:05:14 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:05:14 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:05:14 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:05:14 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:05:14 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:05:14 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:05:14 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:05:15 np0005654373.novalocal systemd-rc-local-generator[7651]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:05:15 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:05:17 np0005654373.novalocal sudo[7579]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:17 np0005654373.novalocal sudo[9635]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-muoidodezddjixfbnmdwyyhdjcdwcbni ; /usr/bin/python3' Mar 21 14:05:17 np0005654373.novalocal sudo[9635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:17 np0005654373.novalocal python3[9666]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Mar 21 14:05:18 np0005654373.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Mar 21 14:05:18 np0005654373.novalocal systemd[1]: Starting Authorization Manager... Mar 21 14:05:18 np0005654373.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Mar 21 14:05:18 np0005654373.novalocal sudo[9635]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:18 np0005654373.novalocal polkitd[11704]: Started polkitd version 0.117 Mar 21 14:05:18 np0005654373.novalocal polkitd[11704]: Loading rules from directory /etc/polkit-1/rules.d Mar 21 14:05:18 np0005654373.novalocal polkitd[11704]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 21 14:05:18 np0005654373.novalocal polkitd[11704]: Finished loading, compiling and executing 2 rules Mar 21 14:05:18 np0005654373.novalocal polkitd[11704]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Mar 21 14:05:18 np0005654373.novalocal systemd[1]: Started Authorization Manager. Mar 21 14:05:18 np0005654373.novalocal sudo[11836]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-haiyovmhdkxvddkezpylosqxwmoyqbgw ; /usr/bin/python3' Mar 21 14:05:18 np0005654373.novalocal sudo[11836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:19 np0005654373.novalocal python3[11858]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:05:19 np0005654373.novalocal sudo[11836]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:19 np0005654373.novalocal sudo[12211]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hsgvozivbqknqhrkptwnkhmnzvihsnnr ; /usr/bin/python3' Mar 21 14:05:19 np0005654373.novalocal sudo[12211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:19 np0005654373.novalocal python3[12227]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:05:20 np0005654373.novalocal sudo[12211]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:20 np0005654373.novalocal sudo[13468]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kgkfxzlbksirdkzkwukmfmaqerjfmvzd ; /usr/bin/python3' Mar 21 14:05:20 np0005654373.novalocal sudo[13468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:20 np0005654373.novalocal python3[13470]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 21 14:05:20 np0005654373.novalocal sudo[13468]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:20 np0005654373.novalocal sudo[13557]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-chcvuhezqpmicsuhqykstqxhsorjgwfz ; /usr/bin/python3' Mar 21 14:05:20 np0005654373.novalocal sudo[13557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:21 np0005654373.novalocal python3[13560]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 21 14:05:21 np0005654373.novalocal sudo[13557]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:21 np0005654373.novalocal sudo[13659]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lttbihxzmbhqjtuqmqkzphadrafxznhz ; /usr/bin/python3' Mar 21 14:05:21 np0005654373.novalocal sudo[13659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:21 np0005654373.novalocal python3[13672]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-epoxy/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Mar 21 14:05:21 np0005654373.novalocal sudo[13659]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:21 np0005654373.novalocal sudo[13851]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-axjbaadbluxcgmxtaxfddcjemtkusucx ; /usr/bin/python3' Mar 21 14:05:21 np0005654373.novalocal sudo[13851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:22 np0005654373.novalocal python3[13865]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Mar 21 14:05:22 np0005654373.novalocal sudo[13851]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:22 np0005654373.novalocal sudo[14048]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ktfagqnxbvbpghydvwfoisolxkysubnp ; /usr/bin/python3' Mar 21 14:05:22 np0005654373.novalocal sudo[14048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:22 np0005654373.novalocal python3[14059]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:05:22 np0005654373.novalocal sudo[14048]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:22 np0005654373.novalocal sudo[14359]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-duqtzckrxihslybeztxcydbaewypoqcv ; /usr/bin/python3' Mar 21 14:05:22 np0005654373.novalocal sudo[14359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:22 np0005654373.novalocal python3[14368]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:05:25 np0005654373.novalocal sudo[14359]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:25 np0005654373.novalocal sudo[16016]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-msgiagrzdhxzflkvksqydrkbvyvhhnjx ; /usr/bin/python3' Mar 21 14:05:25 np0005654373.novalocal sudo[16016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:25 np0005654373.novalocal python3[16030]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Mar 21 14:05:25 np0005654373.novalocal python3[16030]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Mar 21 14:05:25 np0005654373.novalocal sudo[16016]: pam_unix(sudo:session): session closed for user root Mar 21 14:05:26 np0005654373.novalocal sudo[16374]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-htwsqdtnlcfoeusgtvtnxmrlgdlvwlab ; /usr/bin/python3' Mar 21 14:05:26 np0005654373.novalocal sudo[16374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:05:26 np0005654373.novalocal python3[16382]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:05:28 np0005654373.novalocal systemd[4275]: Starting Mark boot as successful... Mar 21 14:05:31 np0005654373.novalocal systemd[4275]: Finished Mark boot as successful. Mar 21 14:05:52 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:05:52 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:05:52 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Consumed 39.952s CPU time. Mar 21 14:05:52 np0005654373.novalocal systemd[1]: run-r26f45bc6a6f049c18f007cab6f9b061f.service: Deactivated successfully. Mar 21 14:06:00 np0005654373.novalocal sudo[16374]: pam_unix(sudo:session): session closed for user root Mar 21 14:06:00 np0005654373.novalocal sudo[28324]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hvakovukwstyzchghdyucxpadbvevqlg ; /usr/bin/python3' Mar 21 14:06:00 np0005654373.novalocal sudo[28324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:06:00 np0005654373.novalocal python3[28326]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:06:13 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:06:13 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:06:46 np0005654373.novalocal groupadd[45440]: group added to /etc/group: name=rtkit, GID=172 Mar 21 14:06:46 np0005654373.novalocal groupadd[45440]: group added to /etc/gshadow: name=rtkit Mar 21 14:06:46 np0005654373.novalocal groupadd[45440]: new group: name=rtkit, GID=172 Mar 21 14:06:46 np0005654373.novalocal useradd[45450]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Mar 21 14:06:46 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:06:46 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:06:46 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:06:47 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:06:47 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: Converting 447 SID table entries... Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:06:58 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:07:05 np0005654373.novalocal groupadd[45523]: group added to /etc/group: name=geoclue, GID=994 Mar 21 14:07:05 np0005654373.novalocal groupadd[45523]: group added to /etc/gshadow: name=geoclue Mar 21 14:07:05 np0005654373.novalocal groupadd[45523]: new group: name=geoclue, GID=994 Mar 21 14:07:05 np0005654373.novalocal useradd[45530]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Mar 21 14:07:05 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:07:05 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=2 res=1 Mar 21 14:07:05 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Reloading rules Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Collecting garbage unconditionally... Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /etc/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Finished loading, compiling and executing 3 rules Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Reloading rules Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Collecting garbage unconditionally... Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /etc/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Finished loading, compiling and executing 3 rules Mar 21 14:07:05 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:07:05 np0005654373.novalocal groupadd[45542]: group added to /etc/group: name=flatpak, GID=993 Mar 21 14:07:05 np0005654373.novalocal groupadd[45542]: group added to /etc/gshadow: name=flatpak Mar 21 14:07:05 np0005654373.novalocal groupadd[45542]: new group: name=flatpak, GID=993 Mar 21 14:07:05 np0005654373.novalocal useradd[45549]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Mar 21 14:07:05 np0005654373.novalocal sshd-session[45481]: Invalid user admin from 185.156.73.233 port 18578 Mar 21 14:07:05 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:07:05 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:07:05 np0005654373.novalocal sshd-session[45481]: Connection closed by invalid user admin 185.156.73.233 port 18578 [preauth] Mar 21 14:07:05 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Reloading rules Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Collecting garbage unconditionally... Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /etc/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Finished loading, compiling and executing 4 rules Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Reloading rules Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Collecting garbage unconditionally... Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /etc/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 21 14:07:05 np0005654373.novalocal polkitd[11704]: Finished loading, compiling and executing 4 rules Mar 21 14:07:07 np0005654373.novalocal sshd[1018]: Received signal 15; terminating. Mar 21 14:07:07 np0005654373.novalocal systemd[1]: Stopping OpenSSH server daemon... Mar 21 14:07:07 np0005654373.novalocal systemd[1]: sshd.service: Deactivated successfully. Mar 21 14:07:07 np0005654373.novalocal systemd[1]: Stopped OpenSSH server daemon. Mar 21 14:07:07 np0005654373.novalocal systemd[1]: Stopped target sshd-keygen.target. Mar 21 14:07:07 np0005654373.novalocal systemd[1]: Stopping sshd-keygen.target... Mar 21 14:07:07 np0005654373.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 21 14:07:07 np0005654373.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 21 14:07:07 np0005654373.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Mar 21 14:07:07 np0005654373.novalocal systemd[1]: Reached target sshd-keygen.target. Mar 21 14:07:07 np0005654373.novalocal systemd[1]: Starting OpenSSH server daemon... Mar 21 14:07:07 np0005654373.novalocal sshd[45590]: Server listening on 0.0.0.0 port 22. Mar 21 14:07:07 np0005654373.novalocal sshd[45590]: Server listening on :: port 22. Mar 21 14:07:07 np0005654373.novalocal systemd[1]: Started OpenSSH server daemon. Mar 21 14:07:08 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:07:08 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:07:08 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:07:08 np0005654373.novalocal systemd-rc-local-generator[45696]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:07:08 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:07:11 np0005654373.novalocal sudo[28324]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:11 np0005654373.novalocal sudo[50095]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jfufzvbmgiztrlxmrtqkebcgikhjhvrq ; /usr/bin/python3' Mar 21 14:07:11 np0005654373.novalocal sudo[50095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:11 np0005654373.novalocal python3[50133]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:07:14 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:07:14 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:07:14 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.919s CPU time. Mar 21 14:07:14 np0005654373.novalocal systemd[1]: run-r90031b042f604b2e9258948ee2c1943a.service: Deactivated successfully. Mar 21 14:07:16 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:07:16 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:07:16 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:07:16 np0005654373.novalocal systemd-rc-local-generator[54013]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:07:16 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:07:17 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:07:17 np0005654373.novalocal sshd-session[54032]: Connection reset by authenticating user root 45.148.10.151 port 22622 [preauth] Mar 21 14:07:17 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:07:17 np0005654373.novalocal sudo[50095]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:17 np0005654373.novalocal systemd[1]: run-ra981ff0c5a4f4490a10d1d00319139fb.service: Deactivated successfully. Mar 21 14:07:17 np0005654373.novalocal sudo[54429]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cfswapiaghpihllvabihblfoyskcjbmq ; /usr/bin/python3' Mar 21 14:07:17 np0005654373.novalocal sudo[54429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:17 np0005654373.novalocal python3[54431]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Mar 21 14:07:17 np0005654373.novalocal sudo[54429]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:17 np0005654373.novalocal sudo[54439]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tlpqcwctsjhdzhwlkmexwdjnrkqctjwn ; /usr/bin/python3' Mar 21 14:07:17 np0005654373.novalocal sudo[54439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:18 np0005654373.novalocal python3[54441]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Mar 21 14:07:18 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:07:18 np0005654373.novalocal systemd-rc-local-generator[54461]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:07:18 np0005654373.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Mar 21 14:07:18 np0005654373.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Mar 21 14:07:18 np0005654373.novalocal systemd[1]: Starting Resets System Activity Logs... Mar 21 14:07:18 np0005654373.novalocal systemd[1]: Finished Resets System Activity Logs. Mar 21 14:07:18 np0005654373.novalocal sudo[54439]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:18 np0005654373.novalocal sudo[54498]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nsnhldmmzrksnxnitzejpsggixfxtwmt ; /usr/bin/python3' Mar 21 14:07:18 np0005654373.novalocal sudo[54498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:18 np0005654373.novalocal python3[54500]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005654373 np0005654373.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Mar 21 14:07:18 np0005654373.novalocal sudo[54498]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:18 np0005654373.novalocal sudo[54507]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jgxvvctrdztfupkgofzjvetsiqdrnrox ; /usr/bin/python3' Mar 21 14:07:18 np0005654373.novalocal sudo[54507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:19 np0005654373.novalocal python3[54509]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Mar 21 14:07:21 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:07:21 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:07:22 np0005654373.novalocal sudo[54507]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:22 np0005654373.novalocal sudo[54842]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pqetyrracegdilnkmycdpllxuktqyxjx ; /usr/bin/python3' Mar 21 14:07:22 np0005654373.novalocal sudo[54842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:22 np0005654373.novalocal python3[54844]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Mar 21 14:07:22 np0005654373.novalocal python3[54844]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Mar 21 14:07:22 np0005654373.novalocal sudo[54842]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:22 np0005654373.novalocal sudo[54854]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jfkhllhegkkegiijcozlhwtinpnukals ; /usr/bin/python3' Mar 21 14:07:22 np0005654373.novalocal sudo[54854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:23 np0005654373.novalocal python3[54856]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Mar 21 14:07:23 np0005654373.novalocal python3[54856]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Mar 21 14:07:23 np0005654373.novalocal sudo[54854]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:23 np0005654373.novalocal sudo[54865]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nlpndaiijwvykzhjfbghsgwhxwybrzgk ; /usr/bin/python3' Mar 21 14:07:23 np0005654373.novalocal sudo[54865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:23 np0005654373.novalocal python3[54867]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2025.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Mar 21 14:07:25 np0005654373.novalocal sudo[54865]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:25 np0005654373.novalocal sudo[54898]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rqchtgpsyrrxaiduxcrmaivvnncbtcxr ; /usr/bin/python3' Mar 21 14:07:25 np0005654373.novalocal sudo[54898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:25 np0005654373.novalocal python3[54900]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 21 14:07:25 np0005654373.novalocal sudo[54898]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:25 np0005654373.novalocal sudo[54922]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ttmztwbjkjcfkoeaofgrvxciyscwmvhh ; /usr/bin/python3' Mar 21 14:07:25 np0005654373.novalocal sudo[54922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:26 np0005654373.novalocal python3[54924]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Mar 21 14:07:26 np0005654373.novalocal sudo[54922]: pam_unix(sudo:session): session closed for user root Mar 21 14:07:26 np0005654373.novalocal sudo[54932]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-flkrceufphdjfqpfvzvdwhspmvwjbmax ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Mar 21 14:07:26 np0005654373.novalocal sudo[54932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:07:26 np0005654373.novalocal python3[54934]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Mar 21 14:08:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:08:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:08:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:08:28 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:08:28 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:08:28 np0005654373.novalocal systemd[1]: run-r890049ef4a104ccd9e7e199953ed0afe.service: Deactivated successfully. Mar 21 14:08:28 np0005654373.novalocal systemd[4275]: Created slice User Background Tasks Slice. Mar 21 14:08:28 np0005654373.novalocal systemd[4275]: Starting Cleanup of User's Temporary Files and Directories... Mar 21 14:08:28 np0005654373.novalocal systemd[4275]: Finished Cleanup of User's Temporary Files and Directories. Mar 21 14:08:39 np0005654373.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:61 across:10286252k Mar 21 14:08:50 np0005654373.novalocal groupadd[55005]: group added to /etc/group: name=puppet, GID=52 Mar 21 14:08:51 np0005654373.novalocal groupadd[55005]: group added to /etc/gshadow: name=puppet Mar 21 14:08:51 np0005654373.novalocal groupadd[55005]: new group: name=puppet, GID=52 Mar 21 14:08:51 np0005654373.novalocal useradd[55012]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Mar 21 14:08:53 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:08:53 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:08:53 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:08:53 np0005654373.novalocal systemd-rc-local-generator[55048]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:08:53 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:08:56 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:08:56 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:08:56 np0005654373.novalocal systemd[1]: run-r9a2388111f22494a94ea72e73f7837c6.service: Deactivated successfully. Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: Converting 479 SID table entries... Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:09:34 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:09:35 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=3 res=1 Mar 21 14:09:35 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:09:35 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:09:35 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:09:37 np0005654373.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Mar 21 14:09:38 np0005654373.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Mar 21 14:09:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:09:38 np0005654373.novalocal systemd-rc-local-generator[56123]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:09:56 np0005654373.novalocal sshd-session[56305]: Connection reset by authenticating user root 45.148.10.147 port 1884 [preauth] Mar 21 14:09:58 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:09:58 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:10:28 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:10:28 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:10:28 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:10:30 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:10:30 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:10:33 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:10:33 np0005654373.novalocal systemd-rc-local-generator[56384]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:10:34 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:10:58 np0005654373.novalocal dbus-broker-launch[794]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Mar 21 14:10:58 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:10:58 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:10:58 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.129s CPU time. Mar 21 14:10:58 np0005654373.novalocal systemd[1]: run-r9c7f79ca22e249ba8e99fe45711aefda.service: Deactivated successfully. Mar 21 14:11:22 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:11:22 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:11:22 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:12:04 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:12:04 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:12:04 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:12:10 np0005654373.novalocal setsebool[62316]: The virt_use_nfs policy boolean was changed to 1 by root Mar 21 14:12:10 np0005654373.novalocal setsebool[62316]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: Converting 517 SID table entries... Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:12:20 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:12:35 np0005654373.novalocal sshd-session[62384]: Connection reset by authenticating user root 2.57.121.17 port 37076 [preauth] Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: Converting 2742 SID table entries... Mar 21 14:13:18 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=6 res=1 Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:13:18 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:13:18 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:13:18 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:13:18 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:13:57 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=7 res=1 Mar 21 14:13:57 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:13:57 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:13:57 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:13:57 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:13:57 np0005654373.novalocal systemd[1]: run-r21eecaf1cc58422bbd787da7c0c87870.service: Deactivated successfully. Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: Converting 2742 SID table entries... Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:14:09 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:14:09 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=8 res=1 Mar 21 14:14:09 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:14:09 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:14:09 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:14:09 np0005654373.novalocal groupadd[63404]: group added to /etc/group: name=memcached, GID=989 Mar 21 14:14:09 np0005654373.novalocal groupadd[63404]: group added to /etc/gshadow: name=memcached Mar 21 14:14:09 np0005654373.novalocal groupadd[63404]: new group: name=memcached, GID=989 Mar 21 14:14:09 np0005654373.novalocal useradd[63411]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Mar 21 14:14:10 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:14:10 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:14:10 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:10 np0005654373.novalocal systemd-rc-local-generator[63844]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:10 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:14:11 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:14:11 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:14:11 np0005654373.novalocal systemd[1]: run-r82d6c40de8574cf79896460188554b9e.service: Deactivated successfully. Mar 21 14:14:11 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:11 np0005654373.novalocal systemd-rc-local-generator[64033]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:11 np0005654373.novalocal systemd[1]: Starting dnf makecache... Mar 21 14:14:11 np0005654373.novalocal systemd[1]: Started memcached daemon. Mar 21 14:14:11 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:11 np0005654373.novalocal systemd-rc-local-generator[64089]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:11 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: Updating Subscription Management repositories. Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: Unable to read consumer identity Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: This system is not registered with an entitlement server. You can use subscription-manager to register. Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: Failed determining last makecache time. Mar 21 14:14:12 np0005654373.novalocal systemd-rc-local-generator[64129]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-barbican-3416cdce80f63f3e499 114 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-ironic-python-agent-1492c705 115 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-cinder-1e77c39613095261cc07f 202 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-python-openstackclient-bc1930c20ede201 218 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-python-cloudkitty-tests-tempest-ef9563 164 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-os-net-config-8bc1df7a06860093d7dadd72 204 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-nova-d524501deb11a6179726d3e 174 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-designate-eb09c9785e1c772c8a 173 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-glance-9b0af563193ef03a1b0f5 173 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-keystone-ea188589f9b8fe42e70 167 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-manila-53ccaa57baf88aa476357 170 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-neutron-d9269bcf1bae33ecc9b1 195 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-octavia-3ac3a9de0de662d1351c 156 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-watcher-d6750e40f8434f75493e 152 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-python-tcib-b72709d85d7267fbc92f40da29 160 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-puppet-openstack_extras-1cd40595440999 151 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-openstack-swift-7fd6c1fd403a2b7eb2cd7e 144 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-python-tempestconf-8e33668cda707818ee1 155 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: delorean-python-django-horizon-19488fb4ae5da3fd 182 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: CentOS Stream 9 - BaseOS 1.0 MB/s | 3.9 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: CentOS Stream 9 - AppStream 1.2 MB/s | 4.4 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: CentOS Stream 9 - Extras packages 984 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: dlrn-epoxy-testing 200 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: dlrn-epoxy-build-deps 216 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: centos9-rabbitmq 1.0 MB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: centos9-storage 1.1 MB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: centos9-opstools 884 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: NFV SIG OpenvSwitch 994 kB/s | 3.0 kB 00:00 Mar 21 14:14:12 np0005654373.novalocal dnf[64052]: Extra Packages for Enterprise Linux 9 - x86_64 220 kB/s | 30 kB 00:00 Mar 21 14:14:13 np0005654373.novalocal dnf[64052]: Metadata cache created. Mar 21 14:14:13 np0005654373.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Mar 21 14:14:13 np0005654373.novalocal systemd[1]: Finished dnf makecache. Mar 21 14:14:13 np0005654373.novalocal systemd[1]: dnf-makecache.service: Consumed 1.123s CPU time. Mar 21 14:14:21 np0005654373.novalocal groupadd[64268]: group added to /etc/group: name=epmd, GID=988 Mar 21 14:14:21 np0005654373.novalocal groupadd[64268]: group added to /etc/gshadow: name=epmd Mar 21 14:14:21 np0005654373.novalocal groupadd[64268]: new group: name=epmd, GID=988 Mar 21 14:14:21 np0005654373.novalocal useradd[64275]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Mar 21 14:14:22 np0005654373.novalocal groupadd[64284]: group added to /etc/group: name=rabbitmq, GID=987 Mar 21 14:14:22 np0005654373.novalocal groupadd[64284]: group added to /etc/gshadow: name=rabbitmq Mar 21 14:14:22 np0005654373.novalocal groupadd[64284]: new group: name=rabbitmq, GID=987 Mar 21 14:14:22 np0005654373.novalocal useradd[64291]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Mar 21 14:14:23 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:23 np0005654373.novalocal systemd-rc-local-generator[64322]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:23 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:14:23 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:14:23 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:24 np0005654373.novalocal systemd-rc-local-generator[64371]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:24 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:14:24 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:14:24 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:14:24 np0005654373.novalocal systemd[1]: run-r52045a60adae4b0a8a98b325d7777fd7.service: Deactivated successfully. Mar 21 14:14:27 np0005654373.novalocal runuser[65145]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:14:27 np0005654373.novalocal runuser[65145]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: Converting 2749 SID table entries... Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:14:41 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:14:42 np0005654373.novalocal groupadd[65656]: group added to /etc/group: name=mysql, GID=27 Mar 21 14:14:42 np0005654373.novalocal groupadd[65656]: group added to /etc/gshadow: name=mysql Mar 21 14:14:42 np0005654373.novalocal groupadd[65656]: new group: name=mysql, GID=27 Mar 21 14:14:42 np0005654373.novalocal useradd[65662]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Mar 21 14:14:43 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=9 res=1 Mar 21 14:14:43 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:14:43 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:14:43 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:43 np0005654373.novalocal systemd-rc-local-generator[66140]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:43 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:14:47 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:14:47 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:14:47 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.787s CPU time. Mar 21 14:14:47 np0005654373.novalocal systemd[1]: run-r75b068045af545f49f8bf93f82883541.service: Deactivated successfully. Mar 21 14:14:47 np0005654373.novalocal groupadd[69507]: group added to /etc/group: name=redis, GID=986 Mar 21 14:14:47 np0005654373.novalocal groupadd[69507]: group added to /etc/gshadow: name=redis Mar 21 14:14:47 np0005654373.novalocal groupadd[69507]: new group: name=redis, GID=986 Mar 21 14:14:47 np0005654373.novalocal useradd[69514]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Mar 21 14:14:48 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:14:48 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:14:48 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:14:48 np0005654373.novalocal systemd-rc-local-generator[69559]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:14:48 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:14:48 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:14:48 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:14:48 np0005654373.novalocal systemd[1]: run-r6009631126344bd1b3908f7a56054cd4.service: Deactivated successfully. Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: Converting 2752 SID table entries... Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:14:59 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:14:59 np0005654373.novalocal groupadd[69888]: group added to /etc/group: name=unbound, GID=985 Mar 21 14:14:59 np0005654373.novalocal groupadd[69888]: group added to /etc/gshadow: name=unbound Mar 21 14:14:59 np0005654373.novalocal groupadd[69888]: new group: name=unbound, GID=985 Mar 21 14:14:59 np0005654373.novalocal useradd[69895]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Mar 21 14:14:59 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=10 res=1 Mar 21 14:14:59 np0005654373.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Mar 21 14:14:59 np0005654373.novalocal groupadd[69908]: group added to /etc/group: name=openvswitch, GID=984 Mar 21 14:14:59 np0005654373.novalocal groupadd[69908]: group added to /etc/gshadow: name=openvswitch Mar 21 14:14:59 np0005654373.novalocal groupadd[69908]: new group: name=openvswitch, GID=984 Mar 21 14:15:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:15:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:15:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:15:00 np0005654373.novalocal useradd[69915]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Mar 21 14:15:00 np0005654373.novalocal groupadd[69925]: group added to /etc/group: name=hugetlbfs, GID=983 Mar 21 14:15:00 np0005654373.novalocal groupadd[69925]: group added to /etc/gshadow: name=hugetlbfs Mar 21 14:15:00 np0005654373.novalocal groupadd[69925]: new group: name=hugetlbfs, GID=983 Mar 21 14:15:00 np0005654373.novalocal usermod[69933]: add 'openvswitch' to group 'hugetlbfs' Mar 21 14:15:00 np0005654373.novalocal usermod[69933]: add 'openvswitch' to shadow group 'hugetlbfs' Mar 21 14:15:01 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:15:01 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:15:01 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:01 np0005654373.novalocal systemd-rc-local-generator[70412]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:01 np0005654373.novalocal systemd-sysv-generator[70416]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:01 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:15:02 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:15:02 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:15:02 np0005654373.novalocal systemd[1]: run-rc2843da29c924535b3815ba43bd48c6b.service: Deactivated successfully. Mar 21 14:15:02 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:02 np0005654373.novalocal systemd-rc-local-generator[70912]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:02 np0005654373.novalocal systemd-sysv-generator[70915]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:02 np0005654373.novalocal systemd[1]: Starting Open vSwitch Database Unit... Mar 21 14:15:02 np0005654373.novalocal chown[70932]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Mar 21 14:15:02 np0005654373.novalocal ovs-ctl[70937]: /etc/openvswitch/conf.db does not exist ... (warning). Mar 21 14:15:03 np0005654373.novalocal ovs-ctl[70937]: Creating empty database /etc/openvswitch/conf.db [ OK ] Mar 21 14:15:03 np0005654373.novalocal ovs-ctl[70937]: Starting ovsdb-server [ OK ] Mar 21 14:15:03 np0005654373.novalocal ovs-vsctl[70986]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.8.0 Mar 21 14:15:03 np0005654373.novalocal ovs-vsctl[71006]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.4.4-99.el9s "external-ids:system-id=\"40327265-1a98-48a4-bfcf-d8e08c77a926\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Mar 21 14:15:03 np0005654373.novalocal ovs-ctl[70937]: Configuring Open vSwitch system IDs [ OK ] Mar 21 14:15:03 np0005654373.novalocal ovs-vsctl[71011]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005654373 Mar 21 14:15:03 np0005654373.novalocal ovs-ctl[70937]: Enabling remote OVSDB managers [ OK ] Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Started Open vSwitch Database Unit. Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Mar 21 14:15:03 np0005654373.novalocal kernel: openvswitch: Open vSwitch switching datapath Mar 21 14:15:03 np0005654373.novalocal ovs-ctl[71056]: Inserting openvswitch module [ OK ] Mar 21 14:15:03 np0005654373.novalocal ovs-ctl[71025]: Starting ovs-vswitchd [ OK ] Mar 21 14:15:03 np0005654373.novalocal ovs-vsctl[71072]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005654373 Mar 21 14:15:03 np0005654373.novalocal ovs-ctl[71025]: Enabling remote OVSDB managers [ OK ] Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Starting Open vSwitch... Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Finished Open vSwitch. Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:03 np0005654373.novalocal systemd-rc-local-generator[71100]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:03 np0005654373.novalocal systemd-sysv-generator[71103]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:03 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:03 np0005654373.novalocal systemd-rc-local-generator[71137]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:03 np0005654373.novalocal systemd-sysv-generator[71140]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:04 np0005654373.novalocal ovs-vsctl[71160]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Mar 21 14:15:04 np0005654373.novalocal kernel: ovs-system: entered promiscuous mode Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.2503] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.2527] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Mar 21 14:15:04 np0005654373.novalocal kernel: Timeout policy base is empty Mar 21 14:15:04 np0005654373.novalocal systemd-udevd[70996]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.2722] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Mar 21 14:15:04 np0005654373.novalocal kernel: br-ex: entered promiscuous mode Mar 21 14:15:04 np0005654373.novalocal systemd-udevd[70997]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.2737] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.2953] device (br-ex): carrier: link connected Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.3204] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.4831] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71193 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal ifdown[71194]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Mar 21 14:15:04 np0005654373.novalocal ifdown[71195]: 'network-scripts' will be removed from distribution in near future. Mar 21 14:15:04 np0005654373.novalocal ifdown[71196]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.5188] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71202 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.5559] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71210 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.5841] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71219 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.6575] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71242 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal ovs-vsctl[71247]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Mar 21 14:15:04 np0005654373.novalocal kernel: br-ex: left promiscuous mode Mar 21 14:15:04 np0005654373.novalocal kernel: ovs-system: left promiscuous mode Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.7563] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71268 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal ifdown[71272]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Mar 21 14:15:04 np0005654373.novalocal ifdown[71273]: 'network-scripts' will be removed from distribution in near future. Mar 21 14:15:04 np0005654373.novalocal ifdown[71274]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.7905] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71280 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.8245] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71291 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.8568] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71303 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.9364] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71329 uid=0 result="success" Mar 21 14:15:04 np0005654373.novalocal ovs-vsctl[71337]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Mar 21 14:15:04 np0005654373.novalocal NetworkManager[871]: [1774116904.9951] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71344 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ifup[71348]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 21 14:15:05 np0005654373.novalocal ifup[71349]: 'network-scripts' will be removed from distribution in near future. Mar 21 14:15:05 np0005654373.novalocal ifup[71350]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.0279] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71356 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.0757] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71368 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ifup[71369]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 21 14:15:05 np0005654373.novalocal ifup[71370]: 'network-scripts' will be removed from distribution in near future. Mar 21 14:15:05 np0005654373.novalocal ifup[71371]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.1064] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71377 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ovs-vsctl[71379]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Mar 21 14:15:05 np0005654373.novalocal kernel: ovs-system: entered promiscuous mode Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.1288] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.1299] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Mar 21 14:15:05 np0005654373.novalocal systemd-udevd[71261]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:15:05 np0005654373.novalocal kernel: No such timeout policy "ovs_test_tp" Mar 21 14:15:05 np0005654373.novalocal kernel: br-ex: entered promiscuous mode Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.1366] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.1376] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Mar 21 14:15:05 np0005654373.novalocal systemd-udevd[71260]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.1626] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71400 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.1931] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71411 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.2437] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71429 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ovs-vsctl[71449]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Mar 21 14:15:05 np0005654373.novalocal kernel: loop1: entered promiscuous mode Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.3359] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.3371] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.3615] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71456 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ifup[71457]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 21 14:15:05 np0005654373.novalocal ifup[71458]: 'network-scripts' will be removed from distribution in near future. Mar 21 14:15:05 np0005654373.novalocal ifup[71459]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.3947] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71465 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ovs-vsctl[71469]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.4554] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71476 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ifup[71477]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Mar 21 14:15:05 np0005654373.novalocal ifup[71478]: 'network-scripts' will be removed from distribution in near future. Mar 21 14:15:05 np0005654373.novalocal ifup[71479]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.4897] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71485 uid=0 result="success" Mar 21 14:15:05 np0005654373.novalocal ovs-vsctl[71489]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Mar 21 14:15:05 np0005654373.novalocal NetworkManager[871]: [1774116905.5377] device (br-ex): carrier: link connected Mar 21 14:15:07 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:15:07 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:15:07 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:07 np0005654373.novalocal systemd-sysv-generator[71566]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:07 np0005654373.novalocal systemd-rc-local-generator[71563]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:07 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:15:08 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:15:08 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:15:08 np0005654373.novalocal systemd[1]: run-r5c99ce80e520466d850059a879feb15d.service: Deactivated successfully. Mar 21 14:15:10 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:15:10 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:15:10 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:10 np0005654373.novalocal systemd-sysv-generator[72017]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:10 np0005654373.novalocal systemd-rc-local-generator[72014]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:11 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:15:11 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:15:11 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:15:11 np0005654373.novalocal systemd[1]: run-ra1f80b9b581f47af9dda812afbef27bd.service: Deactivated successfully. Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72101]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72103]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72105]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72108]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005654373.novalocal Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72110]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72112]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72114]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72116]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72120]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72124]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Mar 21 14:15:12 np0005654373.novalocal ovs-vsctl[72128]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Mar 21 14:15:13 np0005654373.novalocal sshd-session[72129]: Connection reset by authenticating user root 91.224.92.22 port 27292 [preauth] Mar 21 14:15:21 np0005654373.novalocal groupadd[72152]: group added to /etc/group: name=keystone, GID=163 Mar 21 14:15:21 np0005654373.novalocal groupadd[72152]: group added to /etc/gshadow: name=keystone Mar 21 14:15:21 np0005654373.novalocal groupadd[72152]: new group: name=keystone, GID=163 Mar 21 14:15:21 np0005654373.novalocal useradd[72159]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Mar 21 14:15:21 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:15:21 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:15:22 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:15:22 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:15:22 np0005654373.novalocal systemd[1]: run-r70ed2bb82e5b41a58e1743b5f5833208.service: Deactivated successfully. Mar 21 14:15:28 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:15:28 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:15:28 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:15:28 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:15:28 np0005654373.novalocal systemd[1]: run-rdc0d033f45a346999406bc6a0a04d98d.service: Deactivated successfully. Mar 21 14:15:35 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:35 np0005654373.novalocal systemd-sysv-generator[73068]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:35 np0005654373.novalocal systemd-rc-local-generator[73065]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:35 np0005654373.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Mar 21 14:15:35 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:35 np0005654373.novalocal systemd-rc-local-generator[73119]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:35 np0005654373.novalocal systemd-sysv-generator[73122]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:35 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:36 np0005654373.novalocal systemd-sysv-generator[73152]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:36 np0005654373.novalocal systemd-rc-local-generator[73147]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:36 np0005654373.novalocal systemd-logind[807]: Watching system buttons on /dev/input/event0 (Power Button) Mar 21 14:15:36 np0005654373.novalocal systemd-logind[807]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Mar 21 14:15:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:38 np0005654373.novalocal systemd-rc-local-generator[73251]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:38 np0005654373.novalocal systemd-sysv-generator[73255]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:38 np0005654373.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Mar 21 14:15:38 np0005654373.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Mar 21 14:15:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:38 np0005654373.novalocal systemd-rc-local-generator[73296]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:38 np0005654373.novalocal systemd-sysv-generator[73300]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:38 np0005654373.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Mar 21 14:15:40 np0005654373.novalocal groupadd[73320]: group added to /etc/group: name=cinder, GID=165 Mar 21 14:15:40 np0005654373.novalocal groupadd[73320]: group added to /etc/gshadow: name=cinder Mar 21 14:15:40 np0005654373.novalocal groupadd[73320]: new group: name=cinder, GID=165 Mar 21 14:15:40 np0005654373.novalocal useradd[73327]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Mar 21 14:15:40 np0005654373.novalocal useradd[73327]: add 'cinder' to group 'nobody' Mar 21 14:15:40 np0005654373.novalocal useradd[73327]: add 'cinder' to group 'cinder' Mar 21 14:15:40 np0005654373.novalocal useradd[73327]: add 'cinder' to shadow group 'nobody' Mar 21 14:15:40 np0005654373.novalocal useradd[73327]: add 'cinder' to shadow group 'cinder' Mar 21 14:15:41 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:15:41 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:15:41 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:41 np0005654373.novalocal systemd-sysv-generator[73382]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:41 np0005654373.novalocal systemd-rc-local-generator[73378]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:41 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:15:43 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:15:43 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:15:43 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Consumed 2.255s CPU time. Mar 21 14:15:43 np0005654373.novalocal systemd[1]: run-r6d9314a8ca8f487ca502ecbd9830bb5e.service: Deactivated successfully. Mar 21 14:15:43 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:44 np0005654373.novalocal systemd-rc-local-generator[75606]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:44 np0005654373.novalocal systemd-sysv-generator[75611]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:44 np0005654373.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Mar 21 14:15:44 np0005654373.novalocal systemd[1]: Starting Open-iSCSI... Mar 21 14:15:44 np0005654373.novalocal kernel: Loading iSCSI transport class v2.0-870. Mar 21 14:15:44 np0005654373.novalocal systemd[1]: Started Open-iSCSI. Mar 21 14:15:44 np0005654373.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Mar 21 14:15:44 np0005654373.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Mar 21 14:15:44 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:44 np0005654373.novalocal systemd-sysv-generator[75659]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:44 np0005654373.novalocal systemd-rc-local-generator[75655]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:44 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:44 np0005654373.novalocal systemd-rc-local-generator[75694]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:44 np0005654373.novalocal systemd-sysv-generator[75700]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:46 np0005654373.novalocal groupadd[75723]: group added to /etc/group: name=glance, GID=161 Mar 21 14:15:46 np0005654373.novalocal groupadd[75723]: group added to /etc/gshadow: name=glance Mar 21 14:15:46 np0005654373.novalocal groupadd[75723]: new group: name=glance, GID=161 Mar 21 14:15:47 np0005654373.novalocal useradd[75730]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Mar 21 14:15:47 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:47 np0005654373.novalocal systemd-rc-local-generator[75769]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:47 np0005654373.novalocal systemd-sysv-generator[75774]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:47 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:15:54 np0005654373.novalocal groupadd[75812]: group added to /etc/group: name=radvd, GID=75 Mar 21 14:15:54 np0005654373.novalocal groupadd[75812]: group added to /etc/gshadow: name=radvd Mar 21 14:15:54 np0005654373.novalocal groupadd[75812]: new group: name=radvd, GID=75 Mar 21 14:15:54 np0005654373.novalocal useradd[75821]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Mar 21 14:15:55 np0005654373.novalocal groupadd[75836]: group added to /etc/group: name=haproxy, GID=982 Mar 21 14:15:55 np0005654373.novalocal groupadd[75836]: group added to /etc/gshadow: name=haproxy Mar 21 14:15:55 np0005654373.novalocal groupadd[75836]: new group: name=haproxy, GID=982 Mar 21 14:15:55 np0005654373.novalocal useradd[75843]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Mar 21 14:15:55 np0005654373.novalocal groupadd[75855]: group added to /etc/group: name=dnsmasq, GID=981 Mar 21 14:15:55 np0005654373.novalocal groupadd[75855]: group added to /etc/gshadow: name=dnsmasq Mar 21 14:15:55 np0005654373.novalocal groupadd[75855]: new group: name=dnsmasq, GID=981 Mar 21 14:15:55 np0005654373.novalocal useradd[75862]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Mar 21 14:15:55 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:15:55 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:15:57 np0005654373.novalocal groupadd[75874]: group added to /etc/group: name=neutron, GID=980 Mar 21 14:15:57 np0005654373.novalocal groupadd[75874]: group added to /etc/gshadow: name=neutron Mar 21 14:15:57 np0005654373.novalocal groupadd[75874]: new group: name=neutron, GID=980 Mar 21 14:15:57 np0005654373.novalocal useradd[75881]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Mar 21 14:15:58 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:15:58 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:15:58 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:15:58 np0005654373.novalocal systemd-sysv-generator[75939]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:15:58 np0005654373.novalocal systemd-rc-local-generator[75933]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:15:58 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:15:59 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:15:59 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:15:59 np0005654373.novalocal systemd[1]: run-r8b94e3632a6743a198d10e3a78273b4f.service: Deactivated successfully. Mar 21 14:16:01 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:16:01 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:16:01 np0005654373.novalocal systemd-rc-local-generator[76538]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:16:01 np0005654373.novalocal systemd-sysv-generator[76541]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:16:01 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:16:01 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:16:01 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:16:03 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:16:03 np0005654373.novalocal systemd-sysv-generator[76591]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:16:03 np0005654373.novalocal systemd-rc-local-generator[76587]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:16:04 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:16:08 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:16:08 np0005654373.novalocal systemd-sysv-generator[76646]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:16:08 np0005654373.novalocal systemd-rc-local-generator[76642]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:16:08 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:16:09 np0005654373.novalocal ovs-vsctl[76665]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Mar 21 14:16:11 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:16:11 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:16:11 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:16:11 np0005654373.novalocal systemd-rc-local-generator[76709]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:16:11 np0005654373.novalocal systemd-sysv-generator[76712]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:16:11 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:16:12 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:16:12 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:16:12 np0005654373.novalocal systemd[1]: run-r09847ea5ba4f4aefa400d157c32f1bc5.service: Deactivated successfully. Mar 21 14:16:14 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:16:14 np0005654373.novalocal systemd-rc-local-generator[77158]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:16:14 np0005654373.novalocal systemd-sysv-generator[77162]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:16:14 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:16:16 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:16:16 np0005654373.novalocal systemd-rc-local-generator[77212]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:16:16 np0005654373.novalocal systemd-sysv-generator[77218]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:16:17 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:16:24 np0005654373.novalocal groupadd[77246]: group added to /etc/group: name=placement, GID=979 Mar 21 14:16:24 np0005654373.novalocal groupadd[77246]: group added to /etc/gshadow: name=placement Mar 21 14:16:24 np0005654373.novalocal groupadd[77246]: new group: name=placement, GID=979 Mar 21 14:16:24 np0005654373.novalocal useradd[77253]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Mar 21 14:16:29 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:16:29 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:16:30 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:16:30 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:16:30 np0005654373.novalocal systemd[1]: run-re945173bfd0a4841822d41d6822110e4.service: Deactivated successfully. Mar 21 14:16:31 np0005654373.novalocal groupadd[77432]: group added to /etc/group: name=nova, GID=162 Mar 21 14:16:31 np0005654373.novalocal groupadd[77432]: group added to /etc/gshadow: name=nova Mar 21 14:16:31 np0005654373.novalocal groupadd[77432]: new group: name=nova, GID=162 Mar 21 14:16:31 np0005654373.novalocal useradd[77439]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Mar 21 14:16:31 np0005654373.novalocal useradd[77439]: add 'nova' to group 'nobody' Mar 21 14:16:31 np0005654373.novalocal useradd[77439]: add 'nova' to group 'nova' Mar 21 14:16:31 np0005654373.novalocal useradd[77439]: add 'nova' to shadow group 'nobody' Mar 21 14:16:31 np0005654373.novalocal useradd[77439]: add 'nova' to shadow group 'nova' Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: Converting 2780 SID table entries... Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:16:49 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: Converting 2780 SID table entries... Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:16:58 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: Converting 2780 SID table entries... Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:17:07 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: Converting 2784 SID table entries... Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:17:17 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:17:17 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=14 res=1 Mar 21 14:17:17 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:17:17 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:17:17 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:17:17 np0005654373.novalocal groupadd[77589]: group added to /etc/group: name=qemu, GID=107 Mar 21 14:17:17 np0005654373.novalocal groupadd[77589]: group added to /etc/gshadow: name=qemu Mar 21 14:17:17 np0005654373.novalocal groupadd[77589]: new group: name=qemu, GID=107 Mar 21 14:17:17 np0005654373.novalocal useradd[77596]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Mar 21 14:17:17 np0005654373.novalocal useradd[77596]: add 'qemu' to group 'kvm' Mar 21 14:17:17 np0005654373.novalocal useradd[77596]: add 'qemu' to shadow group 'kvm' Mar 21 14:17:18 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:17:18 np0005654373.novalocal dbus-broker-launch[786]: Noticed file-system modification, trigger reload. Mar 21 14:17:18 np0005654373.novalocal groupadd[77634]: group added to /etc/group: name=libvirt, GID=978 Mar 21 14:17:18 np0005654373.novalocal groupadd[77634]: group added to /etc/gshadow: name=libvirt Mar 21 14:17:18 np0005654373.novalocal groupadd[77634]: new group: name=libvirt, GID=978 Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Reloading rules Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Collecting garbage unconditionally... Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Loading rules from directory /etc/polkit-1/rules.d Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Finished loading, compiling and executing 5 rules Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Reloading rules Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Collecting garbage unconditionally... Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Loading rules from directory /etc/polkit-1/rules.d Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 21 14:17:18 np0005654373.novalocal polkitd[11704]: Finished loading, compiling and executing 5 rules Mar 21 14:17:21 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:17:22 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:17:22 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:22 np0005654373.novalocal systemd-sysv-generator[78351]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:22 np0005654373.novalocal systemd-rc-local-generator[78347]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:22 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:17:25 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:17:25 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:17:25 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.003s CPU time. Mar 21 14:17:25 np0005654373.novalocal systemd[1]: run-rbcdb43cc90944e59985f9bf0dd210ab3.service: Deactivated successfully. Mar 21 14:17:25 np0005654373.novalocal groupadd[82044]: group added to /etc/group: name=octavia, GID=977 Mar 21 14:17:25 np0005654373.novalocal groupadd[82044]: group added to /etc/gshadow: name=octavia Mar 21 14:17:25 np0005654373.novalocal groupadd[82044]: new group: name=octavia, GID=977 Mar 21 14:17:25 np0005654373.novalocal useradd[82051]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Mar 21 14:17:30 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:30 np0005654373.novalocal systemd-rc-local-generator[82097]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:30 np0005654373.novalocal systemd-sysv-generator[82100]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:30 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:17:34 np0005654373.novalocal sshd-session[82122]: Connection closed by authenticating user root 185.156.73.233 port 25480 [preauth] Mar 21 14:17:34 np0005654373.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Mar 21 14:17:34 np0005654373.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Mar 21 14:17:34 np0005654373.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Mar 21 14:17:34 np0005654373.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Mar 21 14:17:35 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:35 np0005654373.novalocal systemd-rc-local-generator[82157]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:35 np0005654373.novalocal systemd-sysv-generator[82160]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:35 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:17:37 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:37 np0005654373.novalocal systemd-rc-local-generator[82208]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:37 np0005654373.novalocal systemd-sysv-generator[82212]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:37 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:17:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:40 np0005654373.novalocal systemd-rc-local-generator[82258]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:40 np0005654373.novalocal systemd-sysv-generator[82261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:40 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:17:42 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:42 np0005654373.novalocal systemd-sysv-generator[82311]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:42 np0005654373.novalocal systemd-rc-local-generator[82307]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:42 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:17:52 np0005654373.novalocal groupadd[82349]: group added to /etc/group: name=apache, GID=48 Mar 21 14:17:52 np0005654373.novalocal groupadd[82349]: group added to /etc/gshadow: name=apache Mar 21 14:17:52 np0005654373.novalocal groupadd[82349]: new group: name=apache, GID=48 Mar 21 14:17:52 np0005654373.novalocal useradd[82358]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Mar 21 14:17:54 np0005654373.novalocal sshd-session[82368]: Connection reset by authenticating user root 2.57.121.17 port 59352 [preauth] Mar 21 14:17:56 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:56 np0005654373.novalocal systemd-rc-local-generator[82394]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:56 np0005654373.novalocal systemd-sysv-generator[82398]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:57 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:17:57 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:17:57 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:17:58 np0005654373.novalocal systemd-rc-local-generator[82538]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:17:58 np0005654373.novalocal systemd-sysv-generator[82544]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:17:58 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:17:59 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:17:59 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:17:59 np0005654373.novalocal systemd[1]: run-ra930a4a24536425ba2f7c4b42cd15e91.service: Deactivated successfully. Mar 21 14:18:01 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:18:01 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:18:01 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:18:05 np0005654373.novalocal groupadd[82803]: group added to /etc/group: name=manila, GID=976 Mar 21 14:18:05 np0005654373.novalocal groupadd[82803]: group added to /etc/gshadow: name=manila Mar 21 14:18:05 np0005654373.novalocal groupadd[82803]: new group: name=manila, GID=976 Mar 21 14:18:05 np0005654373.novalocal useradd[82810]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Mar 21 14:18:05 np0005654373.novalocal useradd[82810]: add 'manila' to group 'nobody' Mar 21 14:18:05 np0005654373.novalocal useradd[82810]: add 'manila' to group 'manila' Mar 21 14:18:05 np0005654373.novalocal useradd[82810]: add 'manila' to shadow group 'nobody' Mar 21 14:18:05 np0005654373.novalocal useradd[82810]: add 'manila' to shadow group 'manila' Mar 21 14:18:06 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:18:06 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:18:06 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:06 np0005654373.novalocal systemd-rc-local-generator[82858]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:06 np0005654373.novalocal systemd-sysv-generator[82861]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:06 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:18:06 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:18:06 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:18:06 np0005654373.novalocal systemd[1]: run-r945cfa0651fb4be5bec89af3e5a5ec3b.service: Deactivated successfully. Mar 21 14:18:09 np0005654373.novalocal groupadd[83049]: group added to /etc/group: name=printadmin, GID=975 Mar 21 14:18:09 np0005654373.novalocal groupadd[83049]: group added to /etc/gshadow: name=printadmin Mar 21 14:18:09 np0005654373.novalocal groupadd[83049]: new group: name=printadmin, GID=975 Mar 21 14:18:10 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:18:10 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:18:10 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:10 np0005654373.novalocal systemd-rc-local-generator[83101]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:10 np0005654373.novalocal systemd-sysv-generator[83108]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:11 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:18:11 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:18:11 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:18:11 np0005654373.novalocal systemd[1]: run-r1a3a4950821146dd930148164b00ec8c.service: Deactivated successfully. Mar 21 14:18:12 np0005654373.novalocal kernel: loop: module loaded Mar 21 14:18:12 np0005654373.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Mar 21 14:18:13 np0005654373.novalocal lvm[83700]: PV /dev/loop3 not used. Mar 21 14:18:28 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:18:28 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:18:28 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:18:29 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:18:29 np0005654373.novalocal systemd[1]: run-rb25e3a98cb044c00b4eb026cb6a7d870.service: Deactivated successfully. Mar 21 14:18:36 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:36 np0005654373.novalocal systemd-rc-local-generator[84015]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:36 np0005654373.novalocal systemd-sysv-generator[84018]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:36 np0005654373.novalocal systemd[1]: Starting MariaDB 10.5 database server... Mar 21 14:18:36 np0005654373.novalocal mariadb-prepare-db-dir[84052]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Mar 21 14:18:36 np0005654373.novalocal mariadb-prepare-db-dir[84052]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Mar 21 14:18:36 np0005654373.novalocal systemd[1]: Started MariaDB 10.5 database server. Mar 21 14:18:37 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:37 np0005654373.novalocal systemd-rc-local-generator[84164]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:37 np0005654373.novalocal systemd-sysv-generator[84167]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:37 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:37 np0005654373.novalocal systemd-sysv-generator[84206]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:37 np0005654373.novalocal systemd-rc-local-generator[84203]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:37 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:37 np0005654373.novalocal systemd-rc-local-generator[84246]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:37 np0005654373.novalocal systemd-sysv-generator[84250]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:38 np0005654373.novalocal systemd[1]: Starting Redis persistent key-value database... Mar 21 14:18:38 np0005654373.novalocal systemd[1]: Started Redis persistent key-value database. Mar 21 14:18:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:38 np0005654373.novalocal systemd-rc-local-generator[84294]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:38 np0005654373.novalocal systemd-sysv-generator[84297]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:38 np0005654373.novalocal systemd-sysv-generator[84336]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:38 np0005654373.novalocal systemd-rc-local-generator[84332]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:39 np0005654373.novalocal systemd-rc-local-generator[84375]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:39 np0005654373.novalocal systemd-sysv-generator[84378]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:39 np0005654373.novalocal systemd[1]: Starting Redis Sentinel... Mar 21 14:18:39 np0005654373.novalocal systemd[1]: Started Redis Sentinel. Mar 21 14:18:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:39 np0005654373.novalocal systemd-sysv-generator[84424]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:39 np0005654373.novalocal systemd-rc-local-generator[84421]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:39 np0005654373.novalocal systemd-rc-local-generator[84462]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:39 np0005654373.novalocal systemd-sysv-generator[84468]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:40 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:40 np0005654373.novalocal systemd-sysv-generator[84555]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:40 np0005654373.novalocal systemd-rc-local-generator[84550]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:40 np0005654373.novalocal systemd[1]: Starting OVN northd management daemon... Mar 21 14:18:40 np0005654373.novalocal chown[84569]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Mar 21 14:18:41 np0005654373.novalocal ovn-ctl[84570]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Mar 21 14:18:41 np0005654373.novalocal ovn-ctl[84570]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84672]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84674]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84673]: ovs|00002|vlog(monitor)|INFO|closing log file Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84673]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Mar 21 14:18:41 np0005654373.novalocal ovn-ctl[84570]: Starting ovsdb-nb [ OK ] Mar 21 14:18:41 np0005654373.novalocal ovn-nbctl[84678]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Mar 21 14:18:41 np0005654373.novalocal ovn-ctl[84570]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Mar 21 14:18:41 np0005654373.novalocal ovn-ctl[84570]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84698]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84700]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84699]: ovs|00002|vlog(monitor)|INFO|closing log file Mar 21 14:18:41 np0005654373.novalocal ovsdb-server[84699]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Mar 21 14:18:41 np0005654373.novalocal ovn-ctl[84570]: Starting ovsdb-sb [ OK ] Mar 21 14:18:41 np0005654373.novalocal ovn-sbctl[84704]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Mar 21 14:18:41 np0005654373.novalocal ovn-ctl[84570]: Starting ovn-northd [ OK ] Mar 21 14:18:41 np0005654373.novalocal systemd[1]: Finished OVN northd management daemon. Mar 21 14:18:41 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:41 np0005654373.novalocal systemd-rc-local-generator[84746]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:41 np0005654373.novalocal systemd-sysv-generator[84749]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:41 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:41 np0005654373.novalocal systemd-rc-local-generator[84780]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:41 np0005654373.novalocal systemd-sysv-generator[84784]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:42 np0005654373.novalocal ovn-nbctl[84802]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Mar 21 14:18:42 np0005654373.novalocal ovn-sbctl[84806]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Mar 21 14:18:42 np0005654373.novalocal sudo[84808]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Mar 21 14:18:42 np0005654373.novalocal sudo[84808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:18:42 np0005654373.novalocal sudo[84808]: pam_unix(sudo:session): session closed for user root Mar 21 14:18:42 np0005654373.novalocal ovn-nbctl[84811]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set connection . inactivity_probe=0 Mar 21 14:18:42 np0005654373.novalocal sudo[84813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Mar 21 14:18:42 np0005654373.novalocal sudo[84813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:18:42 np0005654373.novalocal sudo[84813]: pam_unix(sudo:session): session closed for user root Mar 21 14:18:42 np0005654373.novalocal ovn-sbctl[84816]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set connection . inactivity_probe=0 Mar 21 14:18:42 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:18:42 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:18:42 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:18:42 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:42 np0005654373.novalocal systemd-rc-local-generator[84863]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:42 np0005654373.novalocal systemd-sysv-generator[84868]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:42 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:18:42 np0005654373.novalocal systemd[1]: Starting OVN controller daemon... Mar 21 14:18:42 np0005654373.novalocal ovn-ctl[84884]: Starting ovn-controller [ OK ] Mar 21 14:18:42 np0005654373.novalocal systemd[1]: Started OVN controller daemon. Mar 21 14:18:42 np0005654373.novalocal kernel: br-int: entered promiscuous mode Mar 21 14:18:42 np0005654373.novalocal NetworkManager[871]: [1774117122.9934] manager: (br-int): 'openvswitch' plugin not available; creating generic device Mar 21 14:18:42 np0005654373.novalocal NetworkManager[871]: [1774117122.9949] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Mar 21 14:18:43 np0005654373.novalocal systemd-udevd[84941]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:18:43 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:43 np0005654373.novalocal systemd-rc-local-generator[84964]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:43 np0005654373.novalocal systemd-sysv-generator[84967]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:43 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:18:43 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:43 np0005654373.novalocal systemd-sysv-generator[85006]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:43 np0005654373.novalocal systemd-rc-local-generator[85002]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:43 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: Converting 2808 SID table entries... Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: policy capability network_peer_controls=1 Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: policy capability open_perms=1 Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: policy capability extended_socket_class=1 Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: policy capability always_check_network=0 Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 21 14:18:44 np0005654373.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Mar 21 14:18:44 np0005654373.novalocal setsebool[85023]: The os_neutron_dac_override policy boolean was changed to on by root Mar 21 14:18:47 np0005654373.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Mar 21 14:18:47 np0005654373.novalocal dbus-broker-launch[794]: avc: op=load_policy lsm=selinux seqno=16 res=1 Mar 21 14:18:47 np0005654373.novalocal lvm[85043]: PV /dev/loop2 not used. Mar 21 14:18:51 np0005654373.novalocal ovsdb-server[84674]: ovs|00003|memory|INFO|10552 kB peak resident set size after 10.2 seconds Mar 21 14:18:51 np0005654373.novalocal ovsdb-server[84700]: ovs|00003|memory|INFO|11020 kB peak resident set size after 10.0 seconds Mar 21 14:18:51 np0005654373.novalocal ovsdb-server[84674]: ovs|00004|memory|INFO|atoms:44 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Mar 21 14:18:51 np0005654373.novalocal ovsdb-server[84700]: ovs|00004|memory|INFO|atoms:451 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Mar 21 14:18:59 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:18:59 np0005654373.novalocal systemd-rc-local-generator[85083]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:18:59 np0005654373.novalocal systemd-sysv-generator[85087]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:18:59 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:18:59 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:19:01 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:19:01 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:19:01 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:19:01 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:19:02 np0005654373.novalocal systemd-rc-local-generator[85137]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:19:02 np0005654373.novalocal systemd-sysv-generator[85141]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:19:02 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:19:02 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:19:06 np0005654373.novalocal groupadd[85214]: group added to /etc/group: name=clevis, GID=974 Mar 21 14:19:06 np0005654373.novalocal groupadd[85214]: group added to /etc/gshadow: name=clevis Mar 21 14:19:06 np0005654373.novalocal groupadd[85214]: new group: name=clevis, GID=974 Mar 21 14:19:06 np0005654373.novalocal useradd[85221]: new user: name=clevis, UID=977, GID=974, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Mar 21 14:19:06 np0005654373.novalocal usermod[85231]: add 'clevis' to group 'tss' Mar 21 14:19:06 np0005654373.novalocal usermod[85231]: add 'clevis' to shadow group 'tss' Mar 21 14:19:07 np0005654373.novalocal usermod[85247]: add 'nova' to group 'qemu' Mar 21 14:19:07 np0005654373.novalocal usermod[85247]: add 'nova' to shadow group 'qemu' Mar 21 14:19:07 np0005654373.novalocal usermod[85254]: add 'nova' to group 'libvirt' Mar 21 14:19:07 np0005654373.novalocal usermod[85254]: add 'nova' to shadow group 'libvirt' Mar 21 14:19:08 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:19:08 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:19:08 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:19:08 np0005654373.novalocal systemd-rc-local-generator[85334]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:19:08 np0005654373.novalocal systemd-sysv-generator[85337]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:19:08 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:19:08 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:19:11 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:19:11 np0005654373.novalocal systemd-rc-local-generator[88373]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:19:11 np0005654373.novalocal systemd-sysv-generator[88378]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:19:11 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:19:11 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:19:12 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:19:12 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:19:12 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.696s CPU time. Mar 21 14:19:12 np0005654373.novalocal systemd[1]: run-rcda9f9aed79f4b598e28857d8651e23a.service: Deactivated successfully. Mar 21 14:19:13 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:19:14 np0005654373.novalocal systemd-rc-local-generator[89284]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:19:14 np0005654373.novalocal systemd-sysv-generator[89288]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:19:14 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:19:14 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:19:16 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:19:16 np0005654373.novalocal systemd-sysv-generator[89326]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:19:16 np0005654373.novalocal systemd-rc-local-generator[89323]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:19:16 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:19:37 np0005654373.novalocal crontab[89391]: (root) LIST (root) Mar 21 14:19:37 np0005654373.novalocal crontab[89392]: (root) LIST (keystone) Mar 21 14:19:37 np0005654373.novalocal crontab[89393]: (root) LIST (cinder) Mar 21 14:19:37 np0005654373.novalocal crontab[89394]: (root) LIST (glance) Mar 21 14:19:37 np0005654373.novalocal crontab[89395]: (root) LIST (nova) Mar 21 14:19:37 np0005654373.novalocal crontab[89396]: (root) LIST (manila) Mar 21 14:19:37 np0005654373.novalocal crontab[89397]: (root) REPLACE (cinder) Mar 21 14:19:37 np0005654373.novalocal crontab[89398]: (root) REPLACE (glance) Mar 21 14:19:37 np0005654373.novalocal crontab[89399]: (root) REPLACE (glance) Mar 21 14:19:42 np0005654373.novalocal crontab[89414]: (root) REPLACE (glance) Mar 21 14:19:42 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:19:42 np0005654373.novalocal systemd-sysv-generator[89441]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:19:42 np0005654373.novalocal systemd-rc-local-generator[89435]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:19:42 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:01 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:20:01 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:20:01 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:20:15 np0005654373.novalocal crontab[89515]: (root) REPLACE (nova) Mar 21 14:20:23 np0005654373.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Mar 21 14:20:23 np0005654373.novalocal systemd[1]: Starting man-db-cache-update.service... Mar 21 14:20:23 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:23 np0005654373.novalocal systemd-sysv-generator[89566]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:23 np0005654373.novalocal systemd-rc-local-generator[89562]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:23 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:23 np0005654373.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Mar 21 14:20:23 np0005654373.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Mar 21 14:20:23 np0005654373.novalocal systemd[1]: Finished man-db-cache-update.service. Mar 21 14:20:23 np0005654373.novalocal systemd[1]: run-r648686aa28784767903804446125a9ea.service: Deactivated successfully. Mar 21 14:20:31 np0005654373.novalocal sshd-session[89675]: Connection reset by authenticating user root 2.57.122.197 port 2122 [preauth] Mar 21 14:20:32 np0005654373.novalocal crontab[89677]: (root) REPLACE (manila) Mar 21 14:20:32 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:32 np0005654373.novalocal systemd-rc-local-generator[89697]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:32 np0005654373.novalocal systemd-sysv-generator[89700]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:32 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:32 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:33 np0005654373.novalocal systemd-sysv-generator[89749]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:33 np0005654373.novalocal systemd-rc-local-generator[89745]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:33 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:33 np0005654373.novalocal systemd[89760]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Mar 21 14:20:33 np0005654373.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Mar 21 14:20:33 np0005654373.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Mar 21 14:20:33 np0005654373.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Mar 21 14:20:33 np0005654373.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Mar 21 14:20:33 np0005654373.novalocal systemd[1]: Starting RabbitMQ broker... Mar 21 14:20:33 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:33.726750-04:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Mar 21 14:20:33 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:33.735727-04:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Mar 21 14:20:33 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:33.735756-04:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994175-04:00 [info] <0.229.0> Feature flags: list of feature flags found: Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994232-04:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994251-04:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994275-04:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994342-04:00 [info] <0.229.0> Feature flags: [ ] stream_queue Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994357-04:00 [info] <0.229.0> Feature flags: [ ] user_limits Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994373-04:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Mar 21 14:20:34 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:34.994415-04:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:35.199307-04:00 [notice] <0.44.0> Application syslog exited with reason: stopped Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: 2026-03-21 14:20:35.199424-04:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: ## ## RabbitMQ 3.9.21 Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: ## ## Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: ###### ## Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Erlang: 24.3.4.2 [jit] Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: TLS Library: OpenSSL - OpenSSL 3.5.5 27 Jan 2026 Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Doc guides: https://rabbitmq.com/documentation.html Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Support: https://rabbitmq.com/contact.html Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Tutorials: https://rabbitmq.com/getstarted.html Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Monitoring: https://rabbitmq.com/monitoring.html Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Mar 21 14:20:35 np0005654373.novalocal rabbitmq-server[89761]: Config file(s): /etc/rabbitmq/rabbitmq.config Mar 21 14:20:37 np0005654373.novalocal rabbitmq-server[89761]: Starting broker... completed with 3 plugins. Mar 21 14:20:37 np0005654373.novalocal systemd[1]: Started RabbitMQ broker. Mar 21 14:20:37 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:20:37 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:38 np0005654373.novalocal systemd-sysv-generator[89874]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:38 np0005654373.novalocal systemd-rc-local-generator[89869]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:38 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:38 np0005654373.novalocal systemd-rc-local-generator[89910]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:38 np0005654373.novalocal systemd-sysv-generator[89916]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:38 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:38 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:20:38 np0005654373.novalocal runuser[89925]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:38 np0005654373.novalocal setroubleshoot[89844]: failed to retrieve rpm info for path '/proc/net/if_inet6': Mar 21 14:20:38 np0005654373.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Mar 21 14:20:38 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Mar 21 14:20:39 np0005654373.novalocal runuser[89925]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:39 np0005654373.novalocal runuser[89990]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:39 np0005654373.novalocal setroubleshoot[89844]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l b14158c6-84ea-4199-a949-e2b97f26bbc1 Mar 21 14:20:39 np0005654373.novalocal setroubleshoot[89844]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Mar 21 14:20:39 np0005654373.novalocal runuser[89990]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:40 np0005654373.novalocal runuser[90043]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:40 np0005654373.novalocal runuser[90043]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:40 np0005654373.novalocal runuser[90097]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:41 np0005654373.novalocal runuser[90097]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:41 np0005654373.novalocal runuser[90151]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:42 np0005654373.novalocal runuser[90151]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:42 np0005654373.novalocal runuser[90203]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:42 np0005654373.novalocal runuser[90203]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:42 np0005654373.novalocal runuser[90255]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:43 np0005654373.novalocal runuser[90255]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:43 np0005654373.novalocal runuser[90307]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:43 np0005654373.novalocal runuser[90307]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:44 np0005654373.novalocal runuser[90359]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:44 np0005654373.novalocal runuser[90359]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:44 np0005654373.novalocal runuser[90413]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:45 np0005654373.novalocal runuser[90413]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:45 np0005654373.novalocal runuser[90465]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:45 np0005654373.novalocal runuser[90465]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:46 np0005654373.novalocal runuser[90517]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:46 np0005654373.novalocal runuser[90517]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:46 np0005654373.novalocal runuser[90569]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:47 np0005654373.novalocal runuser[90569]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:47 np0005654373.novalocal runuser[90623]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:47 np0005654373.novalocal runuser[90623]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:47 np0005654373.novalocal runuser[90675]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:48 np0005654373.novalocal runuser[90675]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:48 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:49 np0005654373.novalocal systemd-rc-local-generator[90754]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:49 np0005654373.novalocal systemd-sysv-generator[90757]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.109s CPU time. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:49 np0005654373.novalocal systemd-sysv-generator[90801]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:49 np0005654373.novalocal systemd-rc-local-generator[90796]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:49 np0005654373.novalocal systemd-rc-local-generator[90836]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:49 np0005654373.novalocal systemd-sysv-generator[90842]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:49 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:50 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:20:50 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:50 np0005654373.novalocal systemd-sysv-generator[90883]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:50 np0005654373.novalocal systemd-rc-local-generator[90879]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:50 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:50 np0005654373.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Mar 21 14:20:50 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:51 np0005654373.novalocal systemd-rc-local-generator[90920]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:51 np0005654373.novalocal systemd-sysv-generator[90924]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:51 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:51 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:51 np0005654373.novalocal systemd-rc-local-generator[90963]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:51 np0005654373.novalocal systemd-sysv-generator[90967]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:51 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:51 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:51 np0005654373.novalocal systemd-sysv-generator[91010]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:51 np0005654373.novalocal systemd-rc-local-generator[91007]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:51 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:52 np0005654373.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Mar 21 14:20:52 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:52 np0005654373.novalocal systemd-rc-local-generator[91050]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:52 np0005654373.novalocal systemd-sysv-generator[91054]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:52 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:52 np0005654373.novalocal sudo[91073]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Mar 21 14:20:52 np0005654373.novalocal systemd[1]: Created slice User Slice of UID 0. Mar 21 14:20:52 np0005654373.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Mar 21 14:20:52 np0005654373.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Mar 21 14:20:52 np0005654373.novalocal systemd[1]: Starting User Manager for UID 0... Mar 21 14:20:52 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:52 np0005654373.novalocal systemd-sysv-generator[91107]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:52 np0005654373.novalocal systemd-rc-local-generator[91102]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:52 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:52 np0005654373.novalocal systemd[91077]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Queued start job for default target Main User Target. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Created slice User Application Slice. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Started Daily Cleanup of User's Temporary Directories. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Reached target Paths. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Reached target Timers. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Starting D-Bus User Message Bus Socket... Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Starting Create User's Volatile Files and Directories... Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Listening on D-Bus User Message Bus Socket. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Reached target Sockets. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Finished Create User's Volatile Files and Directories. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Reached target Basic System. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Reached target Main User Target. Mar 21 14:20:53 np0005654373.novalocal systemd[91077]: Startup finished in 152ms. Mar 21 14:20:53 np0005654373.novalocal systemd[1]: Started User Manager for UID 0. Mar 21 14:20:53 np0005654373.novalocal systemd[1]: Started Session c1 of User root. Mar 21 14:20:53 np0005654373.novalocal sudo[91073]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:53 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:53 np0005654373.novalocal systemd-rc-local-generator[91150]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:53 np0005654373.novalocal systemd-sysv-generator[91153]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:53 np0005654373.novalocal sudo[91073]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:53 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:53 np0005654373.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Mar 21 14:20:53 np0005654373.novalocal sudo[91169]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Mar 21 14:20:53 np0005654373.novalocal systemd[1]: Started Session c2 of User root. Mar 21 14:20:53 np0005654373.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Mar 21 14:20:53 np0005654373.novalocal sudo[91169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:53 np0005654373.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Mar 21 14:20:53 np0005654373.novalocal target[91172]: No saved config file at /etc/target/saveconfig.json, ok, exiting Mar 21 14:20:53 np0005654373.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Mar 21 14:20:53 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:53 np0005654373.novalocal sudo[91169]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:53 np0005654373.novalocal systemd-rc-local-generator[91210]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:53 np0005654373.novalocal systemd-sysv-generator[91213]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:54 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:54 np0005654373.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Mar 21 14:20:54 np0005654373.novalocal sudo[91184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:20:54 np0005654373.novalocal systemd[1]: Started Session c3 of User root. Mar 21 14:20:54 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:20:54 np0005654373.novalocal systemd-sysv-generator[91250]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:20:54 np0005654373.novalocal systemd-rc-local-generator[91245]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:20:54 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:20:54 np0005654373.novalocal sudo[91184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:54 np0005654373.novalocal runuser[91264]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:54 np0005654373.novalocal sudo[91184]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:54 np0005654373.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Mar 21 14:20:54 np0005654373.novalocal sudo[91310]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Mar 21 14:20:54 np0005654373.novalocal systemd[1]: Started Session c4 of User root. Mar 21 14:20:54 np0005654373.novalocal sudo[91310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:55 np0005654373.novalocal runuser[91264]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:55 np0005654373.novalocal runuser[91320]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:55 np0005654373.novalocal systemd[1]: Started Device-mapper event daemon. Mar 21 14:20:55 np0005654373.novalocal dmeventd[91396]: dmeventd ready for processing. Mar 21 14:20:55 np0005654373.novalocal dmeventd[91396]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Mar 21 14:20:55 np0005654373.novalocal sudo[91310]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:55 np0005654373.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Mar 21 14:20:55 np0005654373.novalocal sudo[91402]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Mar 21 14:20:55 np0005654373.novalocal systemd[1]: Started Session c5 of User root. Mar 21 14:20:55 np0005654373.novalocal sudo[91402]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:55 np0005654373.novalocal runuser[91320]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:55 np0005654373.novalocal runuser[91416]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:55 np0005654373.novalocal sudo[91402]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:55 np0005654373.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Mar 21 14:20:55 np0005654373.novalocal sudo[91434]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Mar 21 14:20:55 np0005654373.novalocal systemd[1]: Started Session c6 of User root. Mar 21 14:20:55 np0005654373.novalocal sudo[91434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:56 np0005654373.novalocal sudo[91434]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:56 np0005654373.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Mar 21 14:20:56 np0005654373.novalocal sudo[91466]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:20:56 np0005654373.novalocal systemd[1]: Started Session c7 of User root. Mar 21 14:20:56 np0005654373.novalocal sudo[91466]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:56 np0005654373.novalocal runuser[91416]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:56 np0005654373.novalocal runuser[91476]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:56 np0005654373.novalocal sudo[91466]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:56 np0005654373.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Mar 21 14:20:56 np0005654373.novalocal sudo[91522]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:20:56 np0005654373.novalocal systemd[1]: Started Session c8 of User root. Mar 21 14:20:56 np0005654373.novalocal sudo[91522]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:56 np0005654373.novalocal sudo[91522]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:56 np0005654373.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Mar 21 14:20:56 np0005654373.novalocal sudo[91532]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:20:56 np0005654373.novalocal runuser[91476]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:56 np0005654373.novalocal systemd[1]: Started Session c9 of User root. Mar 21 14:20:56 np0005654373.novalocal sudo[91532]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:57 np0005654373.novalocal runuser[91539]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:57 np0005654373.novalocal sudo[91532]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:57 np0005654373.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Mar 21 14:20:57 np0005654373.novalocal sudo[91585]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:20:57 np0005654373.novalocal systemd[1]: Started Session c10 of User root. Mar 21 14:20:57 np0005654373.novalocal sudo[91585]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:57 np0005654373.novalocal sudo[91585]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:57 np0005654373.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Mar 21 14:20:57 np0005654373.novalocal sudo[91592]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Mar 21 14:20:57 np0005654373.novalocal systemd[1]: Started Session c11 of User root. Mar 21 14:20:57 np0005654373.novalocal sudo[91592]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:57 np0005654373.novalocal runuser[91539]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:57 np0005654373.novalocal runuser[91602]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:57 np0005654373.novalocal sudo[91592]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:57 np0005654373.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Mar 21 14:20:57 np0005654373.novalocal sudo[91649]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Mar 21 14:20:57 np0005654373.novalocal systemd[1]: Started Session c12 of User root. Mar 21 14:20:57 np0005654373.novalocal sudo[91649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:58 np0005654373.novalocal runuser[91602]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:58 np0005654373.novalocal sudo[91649]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:58 np0005654373.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Mar 21 14:20:58 np0005654373.novalocal sudo[91660]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:20:58 np0005654373.novalocal systemd[1]: Started Session c13 of User root. Mar 21 14:20:58 np0005654373.novalocal sudo[91660]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:58 np0005654373.novalocal runuser[91661]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:58 np0005654373.novalocal sudo[91660]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:58 np0005654373.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Mar 21 14:20:58 np0005654373.novalocal sudo[91709]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:20:58 np0005654373.novalocal systemd[1]: Started Session c14 of User root. Mar 21 14:20:58 np0005654373.novalocal sudo[91709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:58 np0005654373.novalocal runuser[91661]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:58 np0005654373.novalocal runuser[91719]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:20:59 np0005654373.novalocal sudo[91709]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:59 np0005654373.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Mar 21 14:20:59 np0005654373.novalocal sudo[91765]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:20:59 np0005654373.novalocal systemd[1]: Started Session c15 of User root. Mar 21 14:20:59 np0005654373.novalocal sudo[91765]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:59 np0005654373.novalocal sudo[91765]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:59 np0005654373.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Mar 21 14:20:59 np0005654373.novalocal sudo[91771]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:20:59 np0005654373.novalocal systemd[1]: Started Session c16 of User root. Mar 21 14:20:59 np0005654373.novalocal sudo[91771]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:20:59 np0005654373.novalocal runuser[91719]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:20:59 np0005654373.novalocal sudo[91771]: pam_unix(sudo:session): session closed for user root Mar 21 14:20:59 np0005654373.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Mar 21 14:20:59 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:00 np0005654373.novalocal systemd-sysv-generator[91812]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:00 np0005654373.novalocal systemd-rc-local-generator[91807]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:00 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:21:00 np0005654373.novalocal sudo[91787]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:21:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:21:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:21:00 np0005654373.novalocal systemd[1]: Started Session c17 of User root. Mar 21 14:21:00 np0005654373.novalocal sudo[91787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:00 np0005654373.novalocal systemd[1]: Starting OpenStack Neutron (RPC only) Server... Mar 21 14:21:00 np0005654373.novalocal sudo[91787]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:00 np0005654373.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Mar 21 14:21:00 np0005654373.novalocal sudo[91832]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:21:00 np0005654373.novalocal systemd[1]: Started Session c18 of User root. Mar 21 14:21:00 np0005654373.novalocal sudo[91832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:00 np0005654373.novalocal neutron-rpc-server[91830]: This program is using eventlet and has been monkey_patched Mar 21 14:21:00 np0005654373.novalocal sudo[91832]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:00 np0005654373.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Mar 21 14:21:00 np0005654373.novalocal sudo[91840]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:21:00 np0005654373.novalocal systemd[1]: Started Session c19 of User root. Mar 21 14:21:00 np0005654373.novalocal sudo[91840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:01 np0005654373.novalocal sudo[91840]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:01 np0005654373.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Mar 21 14:21:01 np0005654373.novalocal sudo[91844]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:21:01 np0005654373.novalocal systemd[1]: Started Session c20 of User root. Mar 21 14:21:01 np0005654373.novalocal sudo[91844]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:01 np0005654373.novalocal sudo[91844]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:01 np0005654373.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Mar 21 14:21:01 np0005654373.novalocal sudo[91849]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:21:01 np0005654373.novalocal systemd[1]: Started Session c21 of User root. Mar 21 14:21:01 np0005654373.novalocal sudo[91849]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:02 np0005654373.novalocal sudo[91849]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:02 np0005654373.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Mar 21 14:21:02 np0005654373.novalocal sudo[91854]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:21:02 np0005654373.novalocal systemd[1]: Started Session c22 of User root. Mar 21 14:21:02 np0005654373.novalocal sudo[91854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:02 np0005654373.novalocal sudo[91854]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:02 np0005654373.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Mar 21 14:21:02 np0005654373.novalocal sudo[91858]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:21:02 np0005654373.novalocal systemd[1]: Started Session c23 of User root. Mar 21 14:21:02 np0005654373.novalocal sudo[91858]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:02 np0005654373.novalocal systemd[1]: Started OpenStack Neutron (RPC only) Server. Mar 21 14:21:02 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:02 np0005654373.novalocal sudo[91858]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:02 np0005654373.novalocal systemd-sysv-generator[91893]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:02 np0005654373.novalocal systemd-rc-local-generator[91886]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:02 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:03 np0005654373.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Mar 21 14:21:03 np0005654373.novalocal sudo[91889]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:21:03 np0005654373.novalocal systemd[1]: Started Session c24 of User root. Mar 21 14:21:03 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:03 np0005654373.novalocal sudo[91889]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:03 np0005654373.novalocal systemd-rc-local-generator[91929]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:03 np0005654373.novalocal systemd-sysv-generator[91932]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:03 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:03 np0005654373.novalocal sudo[91889]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:03 np0005654373.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Mar 21 14:21:03 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:03 np0005654373.novalocal systemd-rc-local-generator[91972]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:03 np0005654373.novalocal systemd-sysv-generator[91975]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:03 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:03 np0005654373.novalocal systemd[1]: Starting OpenStack Neutron Periodic Workers... Mar 21 14:21:04 np0005654373.novalocal neutron-periodic-workers[91991]: This program is using eventlet and has been monkey_patched Mar 21 14:21:06 np0005654373.novalocal systemd[1]: Started OpenStack Neutron Periodic Workers. Mar 21 14:21:06 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:06 np0005654373.novalocal systemd-sysv-generator[92022]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:06 np0005654373.novalocal systemd-rc-local-generator[92018]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:06 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:06 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:06 np0005654373.novalocal systemd-sysv-generator[92061]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:06 np0005654373.novalocal systemd-rc-local-generator[92057]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:06 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:07 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:07 np0005654373.novalocal systemd-rc-local-generator[92102]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:07 np0005654373.novalocal systemd-sysv-generator[92105]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:07 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:07 np0005654373.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Mar 21 14:21:07 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:07 np0005654373.novalocal systemd-rc-local-generator[92146]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:07 np0005654373.novalocal systemd-sysv-generator[92151]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:08 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:08 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:08 np0005654373.novalocal systemd-rc-local-generator[92185]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:08 np0005654373.novalocal systemd-sysv-generator[92190]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:08 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:08 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:08 np0005654373.novalocal systemd-rc-local-generator[92228]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:08 np0005654373.novalocal systemd-sysv-generator[92232]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:08 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:09 np0005654373.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Mar 21 14:21:09 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:09 np0005654373.novalocal systemd-rc-local-generator[92285]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:09 np0005654373.novalocal systemd-sysv-generator[92288]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:09 np0005654373.novalocal neutron-ovn-vpn-agent[92248]: This program is using eventlet and has been monkey_patched Mar 21 14:21:09 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:09 np0005654373.novalocal sudo[92259]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp8qbk519t/privsep.sock Mar 21 14:21:09 np0005654373.novalocal systemd[1]: Started Session c25 of User root. Mar 21 14:21:09 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:09 np0005654373.novalocal systemd-rc-local-generator[92324]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:09 np0005654373.novalocal systemd-sysv-generator[92327]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:09 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:10 np0005654373.novalocal sudo[92259]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:21:10 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:10 np0005654373.novalocal systemd-rc-local-generator[92369]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:10 np0005654373.novalocal systemd-sysv-generator[92373]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:10 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:10 np0005654373.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Mar 21 14:21:10 np0005654373.novalocal systemd[1]: Starting OpenStack Neutron OVN Maintenance Worker... Mar 21 14:21:10 np0005654373.novalocal sudo[92259]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:11 np0005654373.novalocal neutron-ovn-maintenance-worker[92388]: This program is using eventlet and has been monkey_patched Mar 21 14:21:11 np0005654373.novalocal sudo[92404]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp9o6hlhaw/privsep.sock Mar 21 14:21:11 np0005654373.novalocal systemd[1]: Started Session c26 of User root. Mar 21 14:21:11 np0005654373.novalocal sudo[92404]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:21:12 np0005654373.novalocal sudo[92404]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:13 np0005654373.novalocal systemd[1]: Started OpenStack Neutron OVN Maintenance Worker. Mar 21 14:21:13 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:13 np0005654373.novalocal systemd-rc-local-generator[92441]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:13 np0005654373.novalocal systemd-sysv-generator[92444]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:13 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:13 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:13 np0005654373.novalocal systemd-rc-local-generator[92480]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:13 np0005654373.novalocal systemd-sysv-generator[92484]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:13 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:14 np0005654373.novalocal runuser[92500]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:14 np0005654373.novalocal runuser[92500]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:14 np0005654373.novalocal runuser[92552]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:15 np0005654373.novalocal runuser[92552]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:15 np0005654373.novalocal runuser[92605]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:15 np0005654373.novalocal runuser[92605]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:15 np0005654373.novalocal runuser[92657]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:16 np0005654373.novalocal runuser[92657]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:16 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:16 np0005654373.novalocal systemd-rc-local-generator[92737]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:16 np0005654373.novalocal systemd-sysv-generator[92741]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:16 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:17 np0005654373.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Mar 21 14:21:17 np0005654373.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Mar 21 14:21:17 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:17 np0005654373.novalocal systemd-rc-local-generator[92781]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:17 np0005654373.novalocal systemd-sysv-generator[92784]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:17 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:17 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:17 np0005654373.novalocal systemd-rc-local-generator[92820]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:17 np0005654373.novalocal systemd-sysv-generator[92825]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:17 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:18 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:18 np0005654373.novalocal systemd-rc-local-generator[92865]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:18 np0005654373.novalocal systemd-sysv-generator[92868]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:18 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:18 np0005654373.novalocal systemd[1]: Listening on libvirt locking daemon socket. Mar 21 14:21:18 np0005654373.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Mar 21 14:21:18 np0005654373.novalocal systemd[1]: Starting libvirt locking daemon... Mar 21 14:21:18 np0005654373.novalocal systemd[1]: Started libvirt locking daemon. Mar 21 14:21:18 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:18 np0005654373.novalocal systemd-sysv-generator[92908]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:18 np0005654373.novalocal systemd-rc-local-generator[92904]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:18 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:19 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:19 np0005654373.novalocal systemd-rc-local-generator[92950]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:19 np0005654373.novalocal systemd-sysv-generator[92953]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:19 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:19 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:19 np0005654373.novalocal systemd-sysv-generator[92995]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:19 np0005654373.novalocal systemd-rc-local-generator[92990]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:19 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:19 np0005654373.novalocal systemd[1]: Listening on libvirt logging daemon socket. Mar 21 14:21:19 np0005654373.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Mar 21 14:21:19 np0005654373.novalocal systemd[1]: Starting libvirt logging daemon... Mar 21 14:21:19 np0005654373.novalocal systemd[1]: Started libvirt logging daemon. Mar 21 14:21:20 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:20 np0005654373.novalocal systemd-sysv-generator[93037]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:20 np0005654373.novalocal systemd-rc-local-generator[93031]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:20 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:20 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:20 np0005654373.novalocal systemd-sysv-generator[93071]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:20 np0005654373.novalocal systemd-rc-local-generator[93067]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:20 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:21 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:21 np0005654373.novalocal systemd-rc-local-generator[93112]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:21 np0005654373.novalocal systemd-sysv-generator[93115]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:21 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:21 np0005654373.novalocal systemd[1]: Listening on libvirt secret daemon socket. Mar 21 14:21:21 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:21 np0005654373.novalocal systemd-rc-local-generator[93159]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:21 np0005654373.novalocal systemd-sysv-generator[93164]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:21 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:22 np0005654373.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Mar 21 14:21:22 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:22 np0005654373.novalocal systemd-rc-local-generator[93203]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:22 np0005654373.novalocal systemd-sysv-generator[93206]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:22 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:22 np0005654373.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Mar 21 14:21:23 np0005654373.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Closed libvirt proxy daemon socket. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:23 np0005654373.novalocal systemd-rc-local-generator[93256]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:23 np0005654373.novalocal systemd-sysv-generator[93261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:23 np0005654373.novalocal systemd[1]: Listening on libvirt storage daemon socket. Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Starting libvirt QEMU daemon... Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Started libvirt QEMU daemon. Mar 21 14:21:24 np0005654373.novalocal virtqemud[93280]: libvirt version: 11.10.0, package: 12.el9 (builder@centos.org, 2026-03-10-15:08:41, ) Mar 21 14:21:24 np0005654373.novalocal virtqemud[93280]: hostname: np0005654373.novalocal Mar 21 14:21:24 np0005654373.novalocal virtqemud[93280]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 21 14:21:24 np0005654373.novalocal virtqemud[93280]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 21 14:21:24 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:24 np0005654373.novalocal systemd-sysv-generator[93335]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:24 np0005654373.novalocal systemd-rc-local-generator[93330]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:24 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:25 np0005654373.novalocal systemd[1]: Reached target libvirt guests shutdown target. Mar 21 14:21:25 np0005654373.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Mar 21 14:21:25 np0005654373.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Mar 21 14:21:25 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:25 np0005654373.novalocal systemd-rc-local-generator[93375]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:25 np0005654373.novalocal systemd-sysv-generator[93379]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:25 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:25 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:25 np0005654373.novalocal systemd-rc-local-generator[93415]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:25 np0005654373.novalocal systemd-sysv-generator[93418]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:25 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:26 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:26 np0005654373.novalocal systemd-rc-local-generator[93463]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:26 np0005654373.novalocal systemd-sysv-generator[93467]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:26 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:26 np0005654373.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Mar 21 14:21:26 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:26 np0005654373.novalocal systemd-sysv-generator[93505]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:26 np0005654373.novalocal systemd-rc-local-generator[93502]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:26 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:27 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:27 np0005654373.novalocal systemd-sysv-generator[93548]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:27 np0005654373.novalocal systemd-rc-local-generator[93544]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:27 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:27 np0005654373.novalocal runuser[93563]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:28 np0005654373.novalocal runuser[93563]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:28 np0005654373.novalocal runuser[93615]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:28 np0005654373.novalocal runuser[93615]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:28 np0005654373.novalocal runuser[93668]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:29 np0005654373.novalocal runuser[93668]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:29 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:21:29 np0005654373.novalocal runuser[93721]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:29 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:21:29 np0005654373.novalocal runuser[93721]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:30 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Mar 21 14:21:30 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:30 np0005654373.novalocal systemd-rc-local-generator[93809]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:30 np0005654373.novalocal systemd-sysv-generator[93814]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:30 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:30 np0005654373.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Mar 21 14:21:30 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:30 np0005654373.novalocal systemd-sysv-generator[93860]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:30 np0005654373.novalocal systemd-rc-local-generator[93857]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:30 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:30 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:31 np0005654373.novalocal systemd-sysv-generator[93901]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:31 np0005654373.novalocal systemd-rc-local-generator[93896]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:31 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 359154e2-26e4-407c-a24c-37902bf6edd7 Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l a6f15485-7e2b-4dc5-81e5-3ccfe8f8d38c Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 2ad1d4ff-7d42-4be1-8371-8d8395415c14 Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 71bb84fc-2ecf-4956-a486-ddee455b0f6a Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l ebdfcd15-abac-471b-ad55-6d089c1b9823 Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 70adf402-5b68-4ff2-960d-27a0b18754e8 Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l fdada062-8926-4dbd-9fb7-99d1d2202ce6 Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 89ba7c39-90d3-4cd6-bf7f-6961b95e1aa2 Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 4f00c689-c396-4430-af7b-006a110d7abd Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l e114db6d-4319-4c05-9eed-0c8662e9b14d Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 1891a49e-684b-437d-97f7-036a71a4628a Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l ebdfcd15-abac-471b-ad55-6d089c1b9823 Mar 21 14:21:31 np0005654373.novalocal setroubleshoot[93720]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Mar 21 14:21:31 np0005654373.novalocal systemd-rc-local-generator[93944]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:31 np0005654373.novalocal systemd-sysv-generator[93953]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:31 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:31 np0005654373.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Mar 21 14:21:32 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:32 np0005654373.novalocal systemd-sysv-generator[93991]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:32 np0005654373.novalocal systemd-rc-local-generator[93987]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:32 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:32 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:32 np0005654373.novalocal systemd-sysv-generator[94035]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:32 np0005654373.novalocal systemd-rc-local-generator[94029]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:32 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:32 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:33 np0005654373.novalocal systemd-rc-local-generator[94070]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:33 np0005654373.novalocal systemd-sysv-generator[94074]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:33 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:33 np0005654373.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Mar 21 14:21:33 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:33 np0005654373.novalocal systemd-sysv-generator[94116]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:33 np0005654373.novalocal systemd-rc-local-generator[94111]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:33 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:33 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:34 np0005654373.novalocal systemd-sysv-generator[94156]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:34 np0005654373.novalocal systemd-rc-local-generator[94152]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:34 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:34 np0005654373.novalocal runuser[94174]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:34 np0005654373.novalocal runuser[94174]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:34 np0005654373.novalocal runuser[94226]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:35 np0005654373.novalocal runuser[94226]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:35 np0005654373.novalocal runuser[94279]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:35 np0005654373.novalocal runuser[94279]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:35 np0005654373.novalocal runuser[94335]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:21:36 np0005654373.novalocal runuser[94335]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:21:36 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:37 np0005654373.novalocal systemd-sysv-generator[94428]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:37 np0005654373.novalocal systemd-rc-local-generator[94423]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:37 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:37 np0005654373.novalocal systemd[1]: Started OpenStack Manila Scheduler. Mar 21 14:21:37 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:37 np0005654373.novalocal systemd-sysv-generator[94476]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:37 np0005654373.novalocal systemd-rc-local-generator[94473]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:37 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:37 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:37 np0005654373.novalocal systemd-rc-local-generator[94551]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:37 np0005654373.novalocal systemd-sysv-generator[94554]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:37 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:38 np0005654373.novalocal systemd-rc-local-generator[94599]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:38 np0005654373.novalocal systemd-sysv-generator[94602]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:38 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:38 np0005654373.novalocal systemd[1]: Started OpenStack Manila Share Service. Mar 21 14:21:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:38 np0005654373.novalocal systemd-rc-local-generator[94641]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:38 np0005654373.novalocal systemd-sysv-generator[94646]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:38 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:39 np0005654373.novalocal systemd-rc-local-generator[94682]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:39 np0005654373.novalocal systemd-sysv-generator[94685]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:39 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:39 np0005654373.novalocal systemd-sysv-generator[94730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:39 np0005654373.novalocal systemd-rc-local-generator[94723]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:39 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:40 np0005654373.novalocal systemd[1]: Started OpenStack Manila Data Server. Mar 21 14:21:40 np0005654373.novalocal sudo[94744]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpts76a638/privsep.sock Mar 21 14:21:40 np0005654373.novalocal systemd[1]: Started Session c27 of User root. Mar 21 14:21:40 np0005654373.novalocal sudo[94744]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Mar 21 14:21:40 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:40 np0005654373.novalocal systemd-rc-local-generator[94767]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:40 np0005654373.novalocal systemd-sysv-generator[94771]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:40 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:40 np0005654373.novalocal sudo[94744]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:40 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:40 np0005654373.novalocal systemd-rc-local-generator[94809]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:40 np0005654373.novalocal systemd-sysv-generator[94816]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:40 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:41 np0005654373.novalocal systemd-sysv-generator[94860]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:41 np0005654373.novalocal systemd-rc-local-generator[94857]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 1.257s CPU time. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.146s CPU time. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Mar 21 14:21:41 np0005654373.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Mar 21 14:21:41 np0005654373.novalocal systemd[1]: Starting The Apache HTTP Server... Mar 21 14:21:43 np0005654373.novalocal python3[94881]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Mar 21 14:21:43 np0005654373.novalocal python3[94881]: version_info = version.StrictVersion(__version__).version Mar 21 14:21:46 np0005654373.novalocal python3[94884]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Mar 21 14:21:46 np0005654373.novalocal python3[94884]: version_info = version.StrictVersion(__version__).version Mar 21 14:21:49 np0005654373.novalocal httpd[94896]: Server configured, listening on: ::1 port 9876, ... Mar 21 14:21:49 np0005654373.novalocal systemd[1]: Started The Apache HTTP Server. Mar 21 14:21:49 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:50 np0005654373.novalocal systemd-sysv-generator[95018]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:50 np0005654373.novalocal systemd-rc-local-generator[95014]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:50 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:50 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:21:50 np0005654373.novalocal systemd-sysv-generator[95057]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:21:50 np0005654373.novalocal systemd-rc-local-generator[95053]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:21:50 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:21:50 np0005654373.novalocal crontab[95072]: (root) REPLACE (keystone) Mar 21 14:21:52 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:21:53 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:21:53 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 9b2f3c7e-b21f-44f4-9428-eabdfd3048c1 Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 77be132e-3bdf-45f6-a19a-0b465540be13 Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 8f20cd83-83a7-4f1f-83ef-f4518d197c8e Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41': Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 6c7c4639-6386-4704-97c0-2a519db56fee Mar 21 14:21:54 np0005654373.novalocal setroubleshoot[95079]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:21:58 np0005654373.novalocal sudo[95104]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:21:58 np0005654373.novalocal systemd[1]: Started Session c28 of User root. Mar 21 14:21:58 np0005654373.novalocal sudo[95104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:58 np0005654373.novalocal sudo[95104]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:58 np0005654373.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Mar 21 14:21:58 np0005654373.novalocal sudo[95108]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:21:58 np0005654373.novalocal systemd[1]: Started Session c29 of User root. Mar 21 14:21:58 np0005654373.novalocal sudo[95108]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:59 np0005654373.novalocal sudo[95108]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:59 np0005654373.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Mar 21 14:21:59 np0005654373.novalocal sudo[95112]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:21:59 np0005654373.novalocal systemd[1]: Started Session c30 of User root. Mar 21 14:21:59 np0005654373.novalocal sudo[95112]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:59 np0005654373.novalocal sudo[95112]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:59 np0005654373.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Mar 21 14:21:59 np0005654373.novalocal sudo[95116]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:21:59 np0005654373.novalocal systemd[1]: Started Session c31 of User root. Mar 21 14:21:59 np0005654373.novalocal sudo[95116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:21:59 np0005654373.novalocal sudo[95116]: pam_unix(sudo:session): session closed for user root Mar 21 14:21:59 np0005654373.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Mar 21 14:22:04 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Mar 21 14:22:04 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.169s CPU time. Mar 21 14:22:04 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:22:04 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:22:04 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:22:04 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:22:34 np0005654373.novalocal octavia-health-manager[94173]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1661: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Mar 21 14:22:34 np0005654373.novalocal octavia-health-manager[94173]: self.model_class.amphora_id.in_(expired_ids_query) Mar 21 14:22:58 np0005654373.novalocal sudo[95264]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:22:58 np0005654373.novalocal systemd[1]: Started Session c32 of User root. Mar 21 14:22:58 np0005654373.novalocal sudo[95264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:22:58 np0005654373.novalocal sudo[95264]: pam_unix(sudo:session): session closed for user root Mar 21 14:22:58 np0005654373.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Mar 21 14:22:58 np0005654373.novalocal sudo[95268]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:22:58 np0005654373.novalocal systemd[1]: Started Session c33 of User root. Mar 21 14:22:58 np0005654373.novalocal sudo[95268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:22:59 np0005654373.novalocal sudo[95268]: pam_unix(sudo:session): session closed for user root Mar 21 14:22:59 np0005654373.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Mar 21 14:22:59 np0005654373.novalocal sudo[95272]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:22:59 np0005654373.novalocal systemd[1]: Started Session c34 of User root. Mar 21 14:22:59 np0005654373.novalocal sudo[95272]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:22:59 np0005654373.novalocal sudo[95272]: pam_unix(sudo:session): session closed for user root Mar 21 14:22:59 np0005654373.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Mar 21 14:22:59 np0005654373.novalocal sudo[95276]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:22:59 np0005654373.novalocal systemd[1]: Started Session c35 of User root. Mar 21 14:22:59 np0005654373.novalocal sudo[95276]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:22:59 np0005654373.novalocal sudo[95276]: pam_unix(sudo:session): session closed for user root Mar 21 14:22:59 np0005654373.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Mar 21 14:23:08 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:23:08 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:23:08 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:23:10 np0005654373.novalocal sshd-session[95304]: Connection reset by authenticating user root 2.57.122.193 port 19190 [preauth] Mar 21 14:23:12 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:23:13 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:23:13 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Mar 21 14:23:14 np0005654373.novalocal setroubleshoot[95312]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 7537d47e-03f0-4ce7-a791-aee4d2704f6f Mar 21 14:23:14 np0005654373.novalocal setroubleshoot[95312]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:23:14 np0005654373.novalocal setroubleshoot[95312]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d26023c3-18df-40bb-add2-1761bf48a07f Mar 21 14:23:14 np0005654373.novalocal setroubleshoot[95312]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:23:14 np0005654373.novalocal setroubleshoot[95312]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l b3db3411-a590-42b5-9843-8c32ab385c35 Mar 21 14:23:14 np0005654373.novalocal setroubleshoot[95312]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:23:24 np0005654373.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Mar 21 14:23:24 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Mar 21 14:23:24 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.251s CPU time. Mar 21 14:23:24 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:23:40 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:23:41 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:23:41 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Mar 21 14:23:42 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 7537d47e-03f0-4ce7-a791-aee4d2704f6f Mar 21 14:23:42 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:23:42 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d26023c3-18df-40bb-add2-1761bf48a07f Mar 21 14:23:42 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:23:42 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l b3db3411-a590-42b5-9843-8c32ab385c35 Mar 21 14:23:42 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:23:47 np0005654373.novalocal sudo[95453]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 cinder-volumes/cinder-volumes-pool Mar 21 14:23:47 np0005654373.novalocal systemd[1]: Started Session c36 of User root. Mar 21 14:23:47 np0005654373.novalocal sudo[95453]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:47 np0005654373.novalocal dmeventd[91396]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Mar 21 14:23:48 np0005654373.novalocal dmeventd[91396]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Mar 21 14:23:48 np0005654373.novalocal sudo[95453]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:48 np0005654373.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Mar 21 14:23:50 np0005654373.novalocal sudo[95512]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpql5_tx96/privsep.sock Mar 21 14:23:50 np0005654373.novalocal systemd[1]: Started Session c37 of User root. Mar 21 14:23:50 np0005654373.novalocal sudo[95512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 856622da-2638-460b-9b06-80cc6b289037 Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l bdf34011-90cb-48af-8885-5ff91fcf972b Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1940975b-c761-41b9-9a89-36ad210ad291 Mar 21 14:23:50 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:23:51 np0005654373.novalocal sudo[95512]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 9975f22b-81cb-44e8-b15a-0bfd6ae59981 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 2555b568-1c91-4f53-943f-1b955d87e8f3 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: failed to retrieve rpm info for path '/dev/vda1': Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 130fce4f-3186-4b4e-a6cf-b9133cc66102 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 4c140506-3304-48fa-9c2c-7a35d2e739ea Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 60c92288-c11c-4dc6-bead-5dce05ff7a48 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l bada1ce3-25cf-49b3-bfe7-34f521273542 Mar 21 14:23:51 np0005654373.novalocal sudo[95543]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 35a04bcc-c7ea-40b6-b9f0-8df945a4811f Mar 21 14:23:51 np0005654373.novalocal systemd[1]: Started Session c38 of User root. Mar 21 14:23:51 np0005654373.novalocal sudo[95543]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 1cd79b8d-1ea1-4986-999f-515a693584d0 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 30f9de06-efb3-46aa-819c-0bfe95de93a3 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-s1l2yR. For complete SELinux messages run: sealert -l 4de16d81-cca7-4d48-bd7c-b5e8373a14ed Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-s1l2yR. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-s1l2yR file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-s1l2yR. For complete SELinux messages run: sealert -l 63eec201-8b56-4e8d-a523-0c1fb6f8fce7 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-s1l2yR. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-s1l2yR file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l f1f69e73-609d-4b50-910d-c1b38be9359f Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 15c7e4c0-5a02-43c2-8101-aa9635932f05 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 87c49e73-cdb2-4a6b-9db0-79c67a46a80b Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 797d9fe8-4ec7-48a6-afb3-5e0f23ce9d47 Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 09f77ffe-a9f6-4ae4-bf3d-dcf70f07a5af Mar 21 14:23:51 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:52 np0005654373.novalocal sudo[95543]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:52 np0005654373.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Mar 21 14:23:52 np0005654373.novalocal sudo[95547]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Wp3UCrAhZ5MLai4K54LG cegMHaAQHrJHs5Q4 False -p3260 -a::1 Mar 21 14:23:52 np0005654373.novalocal systemd[1]: Started Session c39 of User root. Mar 21 14:23:52 np0005654373.novalocal sudo[95547]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:53 np0005654373.novalocal sudo[95547]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:53 np0005654373.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Mar 21 14:23:53 np0005654373.novalocal sudo[95562]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:23:53 np0005654373.novalocal systemd[1]: Started Session c40 of User root. Mar 21 14:23:53 np0005654373.novalocal sudo[95562]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:53 np0005654373.novalocal sudo[95562]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:53 np0005654373.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Mar 21 14:23:53 np0005654373.novalocal sudo[95567]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:23:53 np0005654373.novalocal systemd[1]: Started Session c41 of User root. Mar 21 14:23:53 np0005654373.novalocal sudo[95567]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:53 np0005654373.novalocal sudo[95567]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:53 np0005654373.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Mar 21 14:23:53 np0005654373.novalocal sudo[95572]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Wp3UCrAhZ5MLai4K54LG cegMHaAQHrJHs5Q4 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:23:54 np0005654373.novalocal systemd[1]: Started Session c42 of User root. Mar 21 14:23:54 np0005654373.novalocal sudo[95572]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:54 np0005654373.novalocal sudo[95572]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:54 np0005654373.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Mar 21 14:23:54 np0005654373.novalocal sudo[95577]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:23:54 np0005654373.novalocal systemd[1]: Started Session c43 of User root. Mar 21 14:23:54 np0005654373.novalocal sudo[95577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:54 np0005654373.novalocal sudo[95577]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:54 np0005654373.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:23:55 np0005654373.novalocal kernel: iscsi: registered transport (tcp) Mar 21 14:23:55 np0005654373.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Mar 21 14:23:55 np0005654373.novalocal iscsid[75625]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967, portal: ::1,3260] through [iface: default] is operational now Mar 21 14:23:55 np0005654373.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 21 14:23:55 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Mar 21 14:23:55 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405665344b482b0441ea3c0922f3 port group 0 rel port 1 Mar 21 14:23:55 np0005654373.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Mar 21 14:23:55 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Mar 21 14:23:55 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 21 14:23:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 21 14:23:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Mar 21 14:23:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Mar 21 14:23:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 21 14:23:55 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:23:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Mar 21 14:23:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:23:55 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:23:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 3f4d9b74-029b-4050-8c3f-e490bb53587a Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ba8db9b2-048a-4698-9541-b3282d39d599 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 1d099fa3-fcbd-4338-99eb-84f4c70f1e56 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 2f1929c7-d3a4-406a-a9cc-de1bb0bbed04 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 20b5b03f-d28e-4518-a15d-c86eed570a92 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 31ff8e58-1b6b-4ead-985c-28e32a9f375f Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 65ab8f07-073c-44d2-a7da-54628e2fa46d Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 8040baec-3057-4832-921d-feceede52d6f Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. For complete SELinux messages run: sealert -l ce2c3dc3-d228-40b6-9eb6-744c9bd0e7c6 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:23:55 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:56 np0005654373.novalocal sudo[95633]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Mar 21 14:23:56 np0005654373.novalocal systemd[1]: Started Session c44 of User root. Mar 21 14:23:56 np0005654373.novalocal sudo[95633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d5144fed-fcc4-4eac-a00d-5720d58a9102 Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 73ba7abb-d423-4b51-b61c-93553615b510 Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: failed to retrieve rpm info for path '/dev/sda': Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 130fce4f-3186-4b4e-a6cf-b9133cc66102 Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 856622da-2638-460b-9b06-80cc6b289037 Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l bdf34011-90cb-48af-8885-5ff91fcf972b Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1940975b-c761-41b9-9a89-36ad210ad291 Mar 21 14:23:56 np0005654373.novalocal sudo[95633]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:56 np0005654373.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:23:56 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l b9b51a9a-afdd-4623-899b-3a020104261c Mar 21 14:23:57 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 21 14:23:57 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 9bdb2d02-4bec-4b17-bf4d-fcef98d2de0b Mar 21 14:23:57 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:23:57 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 4c140506-3304-48fa-9c2c-7a35d2e739ea Mar 21 14:23:57 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:57 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:23:57 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:23:57 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:23:57 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:23:57 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:23:57 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:23:57 np0005654373.novalocal kernel: sda: sda1 sda15 Mar 21 14:23:57 np0005654373.novalocal sudo[95646]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Mar 21 14:23:57 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 60c92288-c11c-4dc6-bead-5dce05ff7a48 Mar 21 14:23:57 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:57 np0005654373.novalocal systemd[1]: Started Session c45 of User root. Mar 21 14:23:57 np0005654373.novalocal sudo[95646]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 130fce4f-3186-4b4e-a6cf-b9133cc66102 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:58 np0005654373.novalocal sudo[95646]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:58 np0005654373.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l b9b51a9a-afdd-4623-899b-3a020104261c Mar 21 14:23:58 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 1d099fa3-fcbd-4338-99eb-84f4c70f1e56 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:23:58 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: Detached Mar 21 14:23:58 np0005654373.novalocal sudo[95680]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:23:58 np0005654373.novalocal systemd[1]: Started Session c46 of User root. Mar 21 14:23:58 np0005654373.novalocal iscsid[75625]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967, portal: ::1,3260] through [iface: default] is shutdown. Mar 21 14:23:58 np0005654373.novalocal sudo[95680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 3f4d9b74-029b-4050-8c3f-e490bb53587a Mar 21 14:23:58 np0005654373.novalocal sudo[95694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ba8db9b2-048a-4698-9541-b3282d39d599 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal systemd[1]: Started Session c47 of User root. Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:23:58 np0005654373.novalocal sudo[95694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. For complete SELinux messages run: sealert -l 4649b4cc-a021-4e68-b08a-2b363f7e6e76 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 2f1929c7-d3a4-406a-a9cc-de1bb0bbed04 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 4c140506-3304-48fa-9c2c-7a35d2e739ea Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 60c92288-c11c-4dc6-bead-5dce05ff7a48 Mar 21 14:23:58 np0005654373.novalocal sudo[95680]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:58 np0005654373.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 604cd4ff-484e-4c1d-b075-d9540377b9f6 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:23:58 np0005654373.novalocal sudo[95701]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:23:58 np0005654373.novalocal systemd[1]: Started Session c48 of User root. Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal sudo[95701]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. For complete SELinux messages run: sealert -l 20b5b03f-d28e-4518-a15d-c86eed570a92 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l d6c6ac87-fa89-4f2a-9876-c94c29cbea6e Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 08fb82fa-8e03-4a98-acd1-9871f66486d9 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. For complete SELinux messages run: sealert -l 6859792b-6812-490c-af19-f78008d58dd5 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:23:58 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:23:59 np0005654373.novalocal sudo[95694]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:59 np0005654373.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Mar 21 14:23:59 np0005654373.novalocal sudo[95707]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:23:59 np0005654373.novalocal systemd[1]: Started Session c49 of User root. Mar 21 14:23:59 np0005654373.novalocal sudo[95707]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:59 np0005654373.novalocal sudo[95701]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:59 np0005654373.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Mar 21 14:23:59 np0005654373.novalocal sudo[95710]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:23:59 np0005654373.novalocal systemd[1]: Started Session c50 of User root. Mar 21 14:23:59 np0005654373.novalocal sudo[95710]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:59 np0005654373.novalocal sudo[95710]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:59 np0005654373.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Mar 21 14:23:59 np0005654373.novalocal sudo[95715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:23:59 np0005654373.novalocal systemd[1]: Started Session c51 of User root. Mar 21 14:23:59 np0005654373.novalocal sudo[95715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:59 np0005654373.novalocal sudo[95707]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:59 np0005654373.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Mar 21 14:23:59 np0005654373.novalocal sudo[95719]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:23:59 np0005654373.novalocal systemd[1]: Started Session c52 of User root. Mar 21 14:23:59 np0005654373.novalocal sudo[95719]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:23:59 np0005654373.novalocal sudo[95715]: pam_unix(sudo:session): session closed for user root Mar 21 14:23:59 np0005654373.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Mar 21 14:24:00 np0005654373.novalocal sudo[95719]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:00 np0005654373.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Mar 21 14:24:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:24:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:24:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:24:00 np0005654373.novalocal sudo[95727]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:24:00 np0005654373.novalocal systemd[1]: Started Session c53 of User root. Mar 21 14:24:00 np0005654373.novalocal sudo[95727]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:00 np0005654373.novalocal sudo[95727]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:00 np0005654373.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Mar 21 14:24:00 np0005654373.novalocal sudo[95734]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:24:00 np0005654373.novalocal systemd[1]: Started Session c54 of User root. Mar 21 14:24:00 np0005654373.novalocal sudo[95734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:01 np0005654373.novalocal sudo[95734]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:01 np0005654373.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Mar 21 14:24:06 np0005654373.novalocal sudo[95748]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-e6f7db6a-cec4-4eac-a735-50e481a34006 cinder-volumes/cinder-volumes-pool Mar 21 14:24:06 np0005654373.novalocal systemd[1]: Started Session c55 of User root. Mar 21 14:24:06 np0005654373.novalocal sudo[95748]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:06 np0005654373.novalocal sudo[95748]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:06 np0005654373.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Mar 21 14:24:07 np0005654373.novalocal sudo[95762]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp9o07k3he/privsep.sock Mar 21 14:24:07 np0005654373.novalocal systemd[1]: Started Session c56 of User root. Mar 21 14:24:07 np0005654373.novalocal sudo[95762]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 856622da-2638-460b-9b06-80cc6b289037 Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l bdf34011-90cb-48af-8885-5ff91fcf972b Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1940975b-c761-41b9-9a89-36ad210ad291 Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l bdf34011-90cb-48af-8885-5ff91fcf972b Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 1940975b-c761-41b9-9a89-36ad210ad291 Mar 21 14:24:07 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:24:08 np0005654373.novalocal sudo[95762]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 856622da-2638-460b-9b06-80cc6b289037 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 7d958bde-34b6-402c-95e4-c0900ef0941b Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 61d27710-8ca6-4dc3-8ff3-7f77114947af Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 130fce4f-3186-4b4e-a6cf-b9133cc66102 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 4c140506-3304-48fa-9c2c-7a35d2e739ea Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal sudo[95784]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-e6f7db6a-cec4-4eac-a735-50e481a34006 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 60c92288-c11c-4dc6-bead-5dce05ff7a48 Mar 21 14:24:08 np0005654373.novalocal systemd[1]: Started Session c57 of User root. Mar 21 14:24:08 np0005654373.novalocal sudo[95784]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 6e7aef4b-a3c7-4b5a-9a7a-f2b10ff350e6 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 35a04bcc-c7ea-40b6-b9f0-8df945a4811f Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 1cd79b8d-1ea1-4986-999f-515a693584d0 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 30f9de06-efb3-46aa-819c-0bfe95de93a3 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-izOG9L. For complete SELinux messages run: sealert -l 63eec201-8b56-4e8d-a523-0c1fb6f8fce7 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-izOG9L. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-izOG9L file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l f1f69e73-609d-4b50-910d-c1b38be9359f Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 09f77ffe-a9f6-4ae4-bf3d-dcf70f07a5af Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 90648733-d48e-40f7-9377-27f2573482ca Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 797d9fe8-4ec7-48a6-afb3-5e0f23ce9d47 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 15c7e4c0-5a02-43c2-8101-aa9635932f05 Mar 21 14:24:08 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:09 np0005654373.novalocal sudo[95784]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:09 np0005654373.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Mar 21 14:24:09 np0005654373.novalocal sudo[95788]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-e6f7db6a-cec4-4eac-a735-50e481a34006 iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006 PYN5f5ALbozEuf7uDTHs vr3cfeYVSnsndE97 False -p3260 -a::1 Mar 21 14:24:09 np0005654373.novalocal systemd[1]: Started Session c58 of User root. Mar 21 14:24:09 np0005654373.novalocal sudo[95788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:09 np0005654373.novalocal sudo[95788]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:09 np0005654373.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Mar 21 14:24:09 np0005654373.novalocal sudo[95796]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:24:09 np0005654373.novalocal systemd[1]: Started Session c59 of User root. Mar 21 14:24:09 np0005654373.novalocal sudo[95796]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:10 np0005654373.novalocal sudo[95796]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:10 np0005654373.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Mar 21 14:24:10 np0005654373.novalocal sudo[95801]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:24:10 np0005654373.novalocal systemd[1]: Started Session c60 of User root. Mar 21 14:24:10 np0005654373.novalocal sudo[95801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:10 np0005654373.novalocal sudo[95801]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:10 np0005654373.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Mar 21 14:24:10 np0005654373.novalocal sudo[95806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006 PYN5f5ALbozEuf7uDTHs vr3cfeYVSnsndE97 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:24:10 np0005654373.novalocal systemd[1]: Started Session c61 of User root. Mar 21 14:24:10 np0005654373.novalocal sudo[95806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:11 np0005654373.novalocal sudo[95806]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:11 np0005654373.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Mar 21 14:24:11 np0005654373.novalocal sudo[95811]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:24:11 np0005654373.novalocal systemd[1]: Started Session c62 of User root. Mar 21 14:24:11 np0005654373.novalocal sudo[95811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:11 np0005654373.novalocal sudo[95811]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:11 np0005654373.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:24:12 np0005654373.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Mar 21 14:24:12 np0005654373.novalocal iscsid[75625]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006, portal: ::1,3260] through [iface: default] is operational now Mar 21 14:24:12 np0005654373.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 21 14:24:12 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Mar 21 14:24:12 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405d4fa762f49f844e59aab477de port group 0 rel port 1 Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:24:12 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:24:12 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:24:12 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 3f4d9b74-029b-4050-8c3f-e490bb53587a Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ba8db9b2-048a-4698-9541-b3282d39d599 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 1d099fa3-fcbd-4338-99eb-84f4c70f1e56 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 2f1929c7-d3a4-406a-a9cc-de1bb0bbed04 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 20b5b03f-d28e-4518-a15d-c86eed570a92 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 64d45792-bcb9-44ec-bc1c-6441938991ae Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 65ab8f07-073c-44d2-a7da-54628e2fa46d Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 8040baec-3057-4832-921d-feceede52d6f Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. For complete SELinux messages run: sealert -l ce2c3dc3-d228-40b6-9eb6-744c9bd0e7c6 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 3f4d9b74-029b-4050-8c3f-e490bb53587a Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ba8db9b2-048a-4698-9541-b3282d39d599 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 2f1929c7-d3a4-406a-a9cc-de1bb0bbed04 Mar 21 14:24:12 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:13 np0005654373.novalocal sudo[95865]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Mar 21 14:24:13 np0005654373.novalocal systemd[1]: Started Session c63 of User root. Mar 21 14:24:13 np0005654373.novalocal sudo[95865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d5144fed-fcc4-4eac-a00d-5720d58a9102 Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 73ba7abb-d423-4b51-b61c-93553615b510 Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 130fce4f-3186-4b4e-a6cf-b9133cc66102 Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l bdf34011-90cb-48af-8885-5ff91fcf972b Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l b9b51a9a-afdd-4623-899b-3a020104261c Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 21 14:24:13 np0005654373.novalocal sudo[95865]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:13 np0005654373.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 9bdb2d02-4bec-4b17-bf4d-fcef98d2de0b Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 4c140506-3304-48fa-9c2c-7a35d2e739ea Mar 21 14:24:13 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:14 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:24:14 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:24:14 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:24:14 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:24:14 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:24:14 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:24:14 np0005654373.novalocal kernel: sda: sda1 sda15 Mar 21 14:24:14 np0005654373.novalocal sudo[95873]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Mar 21 14:24:14 np0005654373.novalocal systemd[1]: Started Session c64 of User root. Mar 21 14:24:14 np0005654373.novalocal sudo[95873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 60c92288-c11c-4dc6-bead-5dce05ff7a48 Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:24:14 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:24:15 np0005654373.novalocal sudo[95873]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:15 np0005654373.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:24:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. For complete SELinux messages run: sealert -l 4649b4cc-a021-4e68-b08a-2b363f7e6e76 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:24:15 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: Detached Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:24:15 np0005654373.novalocal iscsid[75625]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006, portal: ::1,3260] through [iface: default] is shutdown. Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 604cd4ff-484e-4c1d-b075-d9540377b9f6 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l d6c6ac87-fa89-4f2a-9876-c94c29cbea6e Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 08fb82fa-8e03-4a98-acd1-9871f66486d9 Mar 21 14:24:15 np0005654373.novalocal sudo[95915]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006. For complete SELinux messages run: sealert -l 6859792b-6812-490c-af19-f78008d58dd5 Mar 21 14:24:15 np0005654373.novalocal systemd[1]: Started Session c65 of User root. Mar 21 14:24:15 np0005654373.novalocal sudo[95915]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:15 np0005654373.novalocal setroubleshoot[95422]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:24:15 np0005654373.novalocal sudo[95915]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:15 np0005654373.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Mar 21 14:24:15 np0005654373.novalocal sudo[95921]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:24:15 np0005654373.novalocal systemd[1]: Started Session c66 of User root. Mar 21 14:24:15 np0005654373.novalocal sudo[95921]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:16 np0005654373.novalocal sudo[95921]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:16 np0005654373.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Mar 21 14:24:16 np0005654373.novalocal sudo[95926]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:24:16 np0005654373.novalocal systemd[1]: Started Session c67 of User root. Mar 21 14:24:16 np0005654373.novalocal sudo[95926]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:16 np0005654373.novalocal sudo[95926]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:16 np0005654373.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Mar 21 14:24:16 np0005654373.novalocal sudo[95931]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-e6f7db6a-cec4-4eac-a735-50e481a34006 Mar 21 14:24:16 np0005654373.novalocal systemd[1]: Started Session c68 of User root. Mar 21 14:24:17 np0005654373.novalocal sudo[95931]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:17 np0005654373.novalocal sudo[95931]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:17 np0005654373.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Mar 21 14:24:17 np0005654373.novalocal sudo[95938]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:24:17 np0005654373.novalocal systemd[1]: Started Session c69 of User root. Mar 21 14:24:17 np0005654373.novalocal sudo[95938]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:18 np0005654373.novalocal sudo[95938]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:18 np0005654373.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Mar 21 14:24:25 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Mar 21 14:24:25 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.273s CPU time. Mar 21 14:24:25 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:24:25 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 6.025s CPU time. Mar 21 14:24:42 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:24:43 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:24:43 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 0272e680-c323-485d-b2a3-155292ed5c88 Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l e7432d70-da96-484d-81e6-85e67208bfaa Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 9c112abc-1698-4820-9a30-3fe0255071e1 Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: failed to retrieve rpm info for path '/var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41': Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 286cc6ec-7b69-4f98-a6ec-e74591859201 Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 50a9bcf1-b57e-4c24-854d-151e45e43177 Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 0cd3dcd2-6c7c-4175-b2e8-36ad5c7b2152 Mar 21 14:24:44 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:47 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l e5096152-1f8a-4abf-9664-3e8610fbdeec Mar 21 14:24:47 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:47 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 9dc7b2f0-10a8-4764-9983-dcb4291c0ed2 Mar 21 14:24:47 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:47 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 50a9bcf1-b57e-4c24-854d-151e45e43177 Mar 21 14:24:47 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:48 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 0cd3dcd2-6c7c-4175-b2e8-36ad5c7b2152 Mar 21 14:24:48 np0005654373.novalocal setroubleshoot[96021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:24:58 np0005654373.novalocal sudo[96084]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:24:58 np0005654373.novalocal systemd[1]: Started Session c70 of User root. Mar 21 14:24:58 np0005654373.novalocal sudo[96084]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:58 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Mar 21 14:24:58 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.207s CPU time. Mar 21 14:24:58 np0005654373.novalocal sudo[96084]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:58 np0005654373.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Mar 21 14:24:58 np0005654373.novalocal sudo[96088]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:24:58 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:24:58 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 1.371s CPU time. Mar 21 14:24:58 np0005654373.novalocal systemd[1]: Started Session c71 of User root. Mar 21 14:24:58 np0005654373.novalocal sudo[96088]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:59 np0005654373.novalocal sudo[96088]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:59 np0005654373.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Mar 21 14:24:59 np0005654373.novalocal sudo[96094]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:24:59 np0005654373.novalocal systemd[1]: Started Session c72 of User root. Mar 21 14:24:59 np0005654373.novalocal sudo[96094]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:59 np0005654373.novalocal sudo[96094]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:59 np0005654373.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Mar 21 14:24:59 np0005654373.novalocal sudo[96101]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:24:59 np0005654373.novalocal systemd[1]: Started Session c73 of User root. Mar 21 14:24:59 np0005654373.novalocal sudo[96101]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:24:59 np0005654373.novalocal sudo[96101]: pam_unix(sudo:session): session closed for user root Mar 21 14:24:59 np0005654373.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Mar 21 14:25:09 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:25:09 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:25:09 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:25:49 np0005654373.novalocal sshd-session[96230]: Connection reset by authenticating user root 2.57.121.86 port 5900 [preauth] Mar 21 14:25:58 np0005654373.novalocal sudo[96251]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:25:58 np0005654373.novalocal systemd[1]: Started Session c74 of User root. Mar 21 14:25:58 np0005654373.novalocal sudo[96251]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:25:58 np0005654373.novalocal sudo[96251]: pam_unix(sudo:session): session closed for user root Mar 21 14:25:58 np0005654373.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Mar 21 14:25:58 np0005654373.novalocal sudo[96256]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:25:58 np0005654373.novalocal systemd[1]: Started Session c75 of User root. Mar 21 14:25:58 np0005654373.novalocal sudo[96256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:25:59 np0005654373.novalocal sudo[96256]: pam_unix(sudo:session): session closed for user root Mar 21 14:25:59 np0005654373.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Mar 21 14:25:59 np0005654373.novalocal sudo[96262]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:25:59 np0005654373.novalocal systemd[1]: Started Session c76 of User root. Mar 21 14:25:59 np0005654373.novalocal sudo[96262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:25:59 np0005654373.novalocal sudo[96262]: pam_unix(sudo:session): session closed for user root Mar 21 14:25:59 np0005654373.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Mar 21 14:25:59 np0005654373.novalocal sudo[96267]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:25:59 np0005654373.novalocal systemd[1]: Started Session c77 of User root. Mar 21 14:25:59 np0005654373.novalocal sudo[96267]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:26:00 np0005654373.novalocal sudo[96267]: pam_unix(sudo:session): session closed for user root Mar 21 14:26:00 np0005654373.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Mar 21 14:26:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:26:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:26:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:26:28 np0005654373.novalocal systemd[91077]: Created slice User Background Tasks Slice. Mar 21 14:26:28 np0005654373.novalocal systemd[91077]: Starting Cleanup of User's Temporary Files and Directories... Mar 21 14:26:28 np0005654373.novalocal systemd[91077]: Finished Cleanup of User's Temporary Files and Directories. Mar 21 14:26:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:39 np0005654373.novalocal systemd-rc-local-generator[96412]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:39 np0005654373.novalocal systemd-sysv-generator[96417]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:39 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:39 np0005654373.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Mar 21 14:26:40 np0005654373.novalocal sshd-session[96432]: Connection closed by 45.148.10.240 port 60274 Mar 21 14:26:41 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:26:41 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:26:42 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Mar 21 14:26:43 np0005654373.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Mar 21 14:26:43 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:43 np0005654373.novalocal systemd-rc-local-generator[96477]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:43 np0005654373.novalocal systemd-sysv-generator[96480]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:43 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:43 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:43 np0005654373.novalocal systemd-sysv-generator[96519]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:43 np0005654373.novalocal systemd-rc-local-generator[96516]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:43 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 00cfff3e-c337-4da4-833a-431c9b45df11 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 419637a8-b570-4487-a244-344c912e7cc7 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 4aed4a90-86d1-41c2-86a4-1e815ac95de1 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 39e31810-7f31-404d-b722-6ea0a2074117 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l bfbc1ef2-e641-4f1e-931c-42ae01d74607 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l c36f5352-7b50-4639-89e4-c903bc09fa25 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 05d2ca91-0584-4645-afa1-15ef197b59a8 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 7bd61faf-5074-4b63-868e-3a65c895ce1e Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 267a4004-5c80-4ea5-b685-21343cf2034c Mar 21 14:26:44 np0005654373.novalocal systemd-sysv-generator[96570]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal systemd-rc-local-generator[96567]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 6556931a-c5ca-4b7d-9c73-42b5d8876166 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 0b8f5316-22cc-4726-965b-ce0a2b7a83f2 Mar 21 14:26:44 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:44 np0005654373.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Mar 21 14:26:49 np0005654373.novalocal systemd[1]: Started OpenStack Nova Compute Server. Mar 21 14:26:49 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:49 np0005654373.novalocal systemd-sysv-generator[96630]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:49 np0005654373.novalocal systemd-rc-local-generator[96626]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:49 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:49 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:49 np0005654373.novalocal systemd-rc-local-generator[96670]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:49 np0005654373.novalocal systemd-sysv-generator[96674]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:49 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:49 np0005654373.novalocal systemd[1]: Starting libvirt QEMU daemon... Mar 21 14:26:49 np0005654373.novalocal systemd[1]: Started libvirt QEMU daemon. Mar 21 14:26:50 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:50 np0005654373.novalocal systemd-sysv-generator[96767]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:50 np0005654373.novalocal systemd-rc-local-generator[96762]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:50 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:50 np0005654373.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Mar 21 14:26:51 np0005654373.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Mar 21 14:26:51 np0005654373.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Mar 21 14:26:51 np0005654373.novalocal systemd[1]: Starting libvirt nodedev daemon... Mar 21 14:26:51 np0005654373.novalocal systemd[1]: Started libvirt nodedev daemon. Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 00cfff3e-c337-4da4-833a-431c9b45df11 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 419637a8-b570-4487-a244-344c912e7cc7 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 4aed4a90-86d1-41c2-86a4-1e815ac95de1 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 39e31810-7f31-404d-b722-6ea0a2074117 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l bfbc1ef2-e641-4f1e-931c-42ae01d74607 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l c36f5352-7b50-4639-89e4-c903bc09fa25 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 05d2ca91-0584-4645-afa1-15ef197b59a8 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 7bd61faf-5074-4b63-868e-3a65c895ce1e Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 267a4004-5c80-4ea5-b685-21343cf2034c Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 6556931a-c5ca-4b7d-9c73-42b5d8876166 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 0b8f5316-22cc-4726-965b-ce0a2b7a83f2 Mar 21 14:26:52 np0005654373.novalocal setroubleshoot[96433]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Mar 21 14:26:52 np0005654373.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Mar 21 14:26:52 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:52 np0005654373.novalocal systemd-sysv-generator[96854]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:52 np0005654373.novalocal systemd-rc-local-generator[96850]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:52 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:53 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:26:53 np0005654373.novalocal systemd-rc-local-generator[96888]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:26:53 np0005654373.novalocal systemd-sysv-generator[96893]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:26:53 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:26:58 np0005654373.novalocal sudo[96914]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:26:58 np0005654373.novalocal systemd[1]: Started Session c78 of User root. Mar 21 14:26:58 np0005654373.novalocal sudo[96914]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:26:58 np0005654373.novalocal sudo[96914]: pam_unix(sudo:session): session closed for user root Mar 21 14:26:58 np0005654373.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Mar 21 14:26:58 np0005654373.novalocal sudo[96918]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:26:58 np0005654373.novalocal systemd[1]: Started Session c79 of User root. Mar 21 14:26:58 np0005654373.novalocal sudo[96918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:26:59 np0005654373.novalocal sudo[96918]: pam_unix(sudo:session): session closed for user root Mar 21 14:26:59 np0005654373.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Mar 21 14:26:59 np0005654373.novalocal sudo[96922]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:26:59 np0005654373.novalocal systemd[1]: Started Session c80 of User root. Mar 21 14:26:59 np0005654373.novalocal sudo[96922]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:26:59 np0005654373.novalocal sudo[96922]: pam_unix(sudo:session): session closed for user root Mar 21 14:26:59 np0005654373.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Mar 21 14:26:59 np0005654373.novalocal sudo[96926]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:26:59 np0005654373.novalocal systemd[1]: Started Session c81 of User root. Mar 21 14:26:59 np0005654373.novalocal sudo[96926]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:26:59 np0005654373.novalocal sudo[96926]: pam_unix(sudo:session): session closed for user root Mar 21 14:26:59 np0005654373.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Mar 21 14:27:02 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Mar 21 14:27:02 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.413s CPU time. Mar 21 14:27:02 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:27:02 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:27:02 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:27:02 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:27:02 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 1.886s CPU time. Mar 21 14:27:27 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:27:28 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:27:28 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 4c1966aa-38fb-44d7-8470-20201e903777 Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 7ba03132-cf88-4a23-8e90-2567218c7d08 Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l a47a1045-f274-41c9-a0f8-1a73c2c34f8d Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41': Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l ae63721e-2d47-442e-b1fe-39546d4f1776 Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 2fd135c9-fc29-4120-863b-eab9a37ad8ed Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l c27916f3-cf05-48a3-9a57-bcea07d88aae Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 9ec09deb-e558-4d49-92fd-363eab7bd22b Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 52beab89-e088-4386-a280-b0c21fe2b112 Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l a83707b8-e258-4b77-9bdc-d638faa6aff4 Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l ac1d320b-f417-4e10-b85a-b32c26f2bd1a Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 3be4646d-46df-4fdc-8586-651580bb5cdc Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 2fd135c9-fc29-4120-863b-eab9a37ad8ed Mar 21 14:27:30 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:31 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l c27916f3-cf05-48a3-9a57-bcea07d88aae Mar 21 14:27:31 np0005654373.novalocal setroubleshoot[96955]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:27:38 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:27:38 np0005654373.novalocal systemd-sysv-generator[97022]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:27:38 np0005654373.novalocal systemd-rc-local-generator[97019]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:27:38 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:27:38 np0005654373.novalocal systemd[1]: Started OpenStack Octavia Worker service. Mar 21 14:27:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:27:39 np0005654373.novalocal systemd-rc-local-generator[97099]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:27:39 np0005654373.novalocal systemd-sysv-generator[97104]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:27:39 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:27:39 np0005654373.novalocal systemd[1]: Reloading. Mar 21 14:27:39 np0005654373.novalocal systemd-rc-local-generator[97138]: /etc/rc.d/rc.local is not marked executable, skipping. Mar 21 14:27:39 np0005654373.novalocal systemd-sysv-generator[97142]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Mar 21 14:27:39 np0005654373.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Mar 21 14:27:41 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Mar 21 14:27:41 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.186s CPU time. Mar 21 14:27:41 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:27:41 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 1.598s CPU time. Mar 21 14:27:54 np0005654373.novalocal runuser[97331]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:27:55 np0005654373.novalocal runuser[97331]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:27:55 np0005654373.novalocal runuser[97384]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:27:55 np0005654373.novalocal runuser[97384]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:27:56 np0005654373.novalocal runuser[97438]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:27:56 np0005654373.novalocal runuser[97438]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:27:58 np0005654373.novalocal sudo[97501]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:27:58 np0005654373.novalocal systemd[1]: Started Session c82 of User root. Mar 21 14:27:58 np0005654373.novalocal sudo[97501]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:27:58 np0005654373.novalocal sudo[97501]: pam_unix(sudo:session): session closed for user root Mar 21 14:27:58 np0005654373.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Mar 21 14:27:58 np0005654373.novalocal sudo[97505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:27:58 np0005654373.novalocal systemd[1]: Started Session c83 of User root. Mar 21 14:27:58 np0005654373.novalocal sudo[97505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:27:59 np0005654373.novalocal sudo[97505]: pam_unix(sudo:session): session closed for user root Mar 21 14:27:59 np0005654373.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Mar 21 14:27:59 np0005654373.novalocal sudo[97509]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:27:59 np0005654373.novalocal systemd[1]: Started Session c84 of User root. Mar 21 14:27:59 np0005654373.novalocal sudo[97509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:27:59 np0005654373.novalocal sudo[97509]: pam_unix(sudo:session): session closed for user root Mar 21 14:27:59 np0005654373.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Mar 21 14:27:59 np0005654373.novalocal sudo[97514]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:27:59 np0005654373.novalocal systemd[1]: Started Session c85 of User root. Mar 21 14:27:59 np0005654373.novalocal sudo[97514]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:28:00 np0005654373.novalocal sudo[97514]: pam_unix(sudo:session): session closed for user root Mar 21 14:28:00 np0005654373.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Mar 21 14:28:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:28:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:28:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:28:19 np0005654373.novalocal sudo[97843]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Mar 21 14:28:19 np0005654373.novalocal sudo[97843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:28:19 np0005654373.novalocal sudo[97843]: pam_unix(sudo:session): session closed for user root Mar 21 14:28:19 np0005654373.novalocal sudo[97847]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Mar 21 14:28:20 np0005654373.novalocal sudo[97847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:28:20 np0005654373.novalocal sudo[97847]: pam_unix(sudo:session): session closed for user root Mar 21 14:28:27 np0005654373.novalocal sshd-session[97856]: Connection reset by authenticating user root 2.57.122.190 port 50442 [preauth] Mar 21 14:28:39 np0005654373.novalocal crontab[97911]: (root) LIST (root) Mar 21 14:28:39 np0005654373.novalocal crontab[97912]: (root) LIST (keystone) Mar 21 14:28:39 np0005654373.novalocal crontab[97913]: (root) LIST (cinder) Mar 21 14:28:39 np0005654373.novalocal crontab[97922]: (root) LIST (glance) Mar 21 14:28:39 np0005654373.novalocal crontab[97951]: (root) LIST (nova) Mar 21 14:28:39 np0005654373.novalocal crontab[97952]: (root) LIST (manila) Mar 21 14:28:41 np0005654373.novalocal runuser[97960]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:42 np0005654373.novalocal runuser[97960]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:42 np0005654373.novalocal runuser[98014]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:43 np0005654373.novalocal runuser[98014]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:43 np0005654373.novalocal runuser[98066]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:44 np0005654373.novalocal runuser[98066]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:44 np0005654373.novalocal runuser[98120]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:44 np0005654373.novalocal runuser[98120]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:44 np0005654373.novalocal runuser[98173]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:45 np0005654373.novalocal runuser[98173]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:45 np0005654373.novalocal runuser[98225]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:45 np0005654373.novalocal runuser[98225]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:45 np0005654373.novalocal runuser[98277]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:46 np0005654373.novalocal runuser[98277]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:46 np0005654373.novalocal runuser[98331]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:47 np0005654373.novalocal runuser[98331]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:47 np0005654373.novalocal runuser[98383]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:47 np0005654373.novalocal runuser[98383]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:47 np0005654373.novalocal runuser[98437]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:48 np0005654373.novalocal runuser[98437]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:49 np0005654373.novalocal runuser[98499]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:49 np0005654373.novalocal runuser[98499]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:49 np0005654373.novalocal runuser[98552]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:50 np0005654373.novalocal runuser[98552]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:50 np0005654373.novalocal runuser[98606]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:51 np0005654373.novalocal runuser[98606]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:51 np0005654373.novalocal runuser[98658]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:51 np0005654373.novalocal runuser[98658]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:52 np0005654373.novalocal runuser[98723]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:53 np0005654373.novalocal runuser[98723]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:53 np0005654373.novalocal runuser[98776]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:53 np0005654373.novalocal runuser[98776]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:54 np0005654373.novalocal virtqemud[96706]: libvirt version: 11.10.0, package: 12.el9 (builder@centos.org, 2026-03-10-15:08:41, ) Mar 21 14:28:54 np0005654373.novalocal virtqemud[96706]: hostname: np0005654373.novalocal Mar 21 14:28:54 np0005654373.novalocal virtqemud[96706]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 21 14:28:55 np0005654373.novalocal virtqemud[96706]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 21 14:28:55 np0005654373.novalocal runuser[98859]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:55 np0005654373.novalocal runuser[98859]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:56 np0005654373.novalocal runuser[98911]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:56 np0005654373.novalocal runuser[98911]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:57 np0005654373.novalocal runuser[98971]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:57 np0005654373.novalocal runuser[98971]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:28:57 np0005654373.novalocal runuser[99025]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Mar 21 14:28:58 np0005654373.novalocal runuser[99025]: pam_unix(runuser:session): session closed for user rabbitmq Mar 21 14:29:09 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:29:09 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:29:09 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:29:41 np0005654373.novalocal sshd-session[99171]: Invalid user ubnt from 80.94.95.116 port 28078 Mar 21 14:29:41 np0005654373.novalocal sshd-session[99171]: Connection closed by invalid user ubnt 80.94.95.116 port 28078 [preauth] Mar 21 14:29:58 np0005654373.novalocal sudo[99254]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:29:58 np0005654373.novalocal systemd[1]: Started Session c86 of User root. Mar 21 14:29:58 np0005654373.novalocal sudo[99254]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:29:58 np0005654373.novalocal sudo[99254]: pam_unix(sudo:session): session closed for user root Mar 21 14:29:58 np0005654373.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Mar 21 14:29:58 np0005654373.novalocal sudo[99258]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:29:58 np0005654373.novalocal systemd[1]: Started Session c87 of User root. Mar 21 14:29:58 np0005654373.novalocal sudo[99258]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:29:59 np0005654373.novalocal sudo[99258]: pam_unix(sudo:session): session closed for user root Mar 21 14:29:59 np0005654373.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Mar 21 14:29:59 np0005654373.novalocal sudo[99263]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:29:59 np0005654373.novalocal systemd[1]: Started Session c88 of User root. Mar 21 14:29:59 np0005654373.novalocal sudo[99263]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:29:59 np0005654373.novalocal sudo[99263]: pam_unix(sudo:session): session closed for user root Mar 21 14:29:59 np0005654373.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Mar 21 14:29:59 np0005654373.novalocal sudo[99270]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:29:59 np0005654373.novalocal systemd[1]: Started Session c89 of User root. Mar 21 14:29:59 np0005654373.novalocal sudo[99270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:30:00 np0005654373.novalocal sudo[99270]: pam_unix(sudo:session): session closed for user root Mar 21 14:30:00 np0005654373.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Mar 21 14:30:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:30:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:30:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Created slice User Slice of UID 163. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Created slice User Slice of UID 161. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Starting User Manager for UID 163... Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Starting User Manager for UID 161... Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Failed to resolve symlink /root/.local/share/flatpak/exports/share/systemd/user, ignoring: Permission denied Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Failed to resolve symlink /root/.local/share/flatpak/exports/share/systemd/user, ignoring: Permission denied Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Failed to open "/root/.local/share/flatpak/exports/share/systemd/user", ignoring: Permission denied Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Failed to open "/root/.local/share/flatpak/exports/share/systemd/user", ignoring: Permission denied Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Queued start job for default target Main User Target. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Queued start job for default target Main User Target. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Created slice User Application Slice. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Created slice User Application Slice. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Started Daily Cleanup of User's Temporary Directories. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Reached target Paths. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Reached target Timers. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Started Daily Cleanup of User's Temporary Directories. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Reached target Paths. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Reached target Timers. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Starting D-Bus User Message Bus Socket... Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Starting D-Bus User Message Bus Socket... Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Listening on PipeWire PulseAudio. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Listening on PipeWire Multimedia System Sockets. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Listening on PipeWire PulseAudio. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Listening on PipeWire Multimedia System Sockets. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Starting Create User's Volatile Files and Directories... Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Starting Create User's Volatile Files and Directories... Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Listening on D-Bus User Message Bus Socket. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Reached target Sockets. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Listening on D-Bus User Message Bus Socket. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Reached target Sockets. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Finished Create User's Volatile Files and Directories. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Reached target Basic System. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Started User Manager for UID 161. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Finished Create User's Volatile Files and Directories. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Reached target Main User Target. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Reached target Basic System. Mar 21 14:30:01 np0005654373.novalocal systemd[99287]: Startup finished in 162ms. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Reached target Main User Target. Mar 21 14:30:01 np0005654373.novalocal systemd[99285]: Startup finished in 172ms. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Started User Manager for UID 163. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Started Session 5 of User glance. Mar 21 14:30:01 np0005654373.novalocal systemd[1]: Started Session 6 of User keystone. Mar 21 14:30:01 np0005654373.novalocal CROND[99301]: (glance) CMD (glance-cache-pruner) Mar 21 14:30:01 np0005654373.novalocal CROND[99302]: (keystone) CMD (keystone-manage fernet_rotate) Mar 21 14:30:02 np0005654373.novalocal CROND[99279]: (glance) CMDOUT (2026-03-21 14:30:02.537 99301 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Mar 21 14:30:02 np0005654373.novalocal CROND[99279]: (glance) CMDOUT (2026-03-21 14:30:02.798 99301 DEBUG glance.image_cache [None req-e98b3957-37f5-4755-bffd-052c0e49f6e4 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Mar 21 14:30:02 np0005654373.novalocal CROND[99279]: (glance) CMDEND (glance-cache-pruner) Mar 21 14:30:03 np0005654373.novalocal systemd[1]: session-5.scope: Deactivated successfully. Mar 21 14:30:03 np0005654373.novalocal systemd[1]: session-5.scope: Consumed 1.075s CPU time. Mar 21 14:30:04 np0005654373.novalocal CROND[99280]: (keystone) CMDEND (keystone-manage fernet_rotate) Mar 21 14:30:04 np0005654373.novalocal systemd[1]: session-6.scope: Deactivated successfully. Mar 21 14:30:04 np0005654373.novalocal systemd[1]: session-6.scope: Consumed 1.927s CPU time. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: Stopping User Manager for UID 161... Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Activating special unit Exit the Session... Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Stopped target Main User Target. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Stopped target Basic System. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Stopped target Paths. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Stopped target Sockets. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Stopped target Timers. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Stopped Daily Cleanup of User's Temporary Directories. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Closed D-Bus User Message Bus Socket. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Closed PipeWire PulseAudio. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Closed PipeWire Multimedia System Sockets. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Stopped Create User's Volatile Files and Directories. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Removed slice User Application Slice. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Reached target Shutdown. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Finished Exit the Session. Mar 21 14:30:13 np0005654373.novalocal systemd[99287]: Reached target Exit the Session. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: user@161.service: Deactivated successfully. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: Stopped User Manager for UID 161. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Mar 21 14:30:13 np0005654373.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: Removed slice User Slice of UID 161. Mar 21 14:30:13 np0005654373.novalocal systemd[1]: user-161.slice: Consumed 1.285s CPU time. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: Stopping User Manager for UID 163... Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Activating special unit Exit the Session... Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Stopped target Main User Target. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Stopped target Basic System. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Stopped target Paths. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Stopped target Sockets. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Stopped target Timers. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Stopped Daily Cleanup of User's Temporary Directories. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Closed D-Bus User Message Bus Socket. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Closed PipeWire PulseAudio. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Closed PipeWire Multimedia System Sockets. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Stopped Create User's Volatile Files and Directories. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Removed slice User Application Slice. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Reached target Shutdown. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Finished Exit the Session. Mar 21 14:30:14 np0005654373.novalocal systemd[99285]: Reached target Exit the Session. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: user@163.service: Deactivated successfully. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: Stopped User Manager for UID 163. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Mar 21 14:30:14 np0005654373.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: Removed slice User Slice of UID 163. Mar 21 14:30:14 np0005654373.novalocal systemd[1]: user-163.slice: Consumed 2.116s CPU time. Mar 21 14:30:50 np0005654373.novalocal sudo[99468]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpnlwa_nnj/privsep.sock Mar 21 14:30:50 np0005654373.novalocal systemd[1]: Started Session c90 of User root. Mar 21 14:30:50 np0005654373.novalocal sudo[99468]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:30:51 np0005654373.novalocal sudo[99468]: pam_unix(sudo:session): session closed for user root Mar 21 14:30:58 np0005654373.novalocal sudo[99490]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:30:58 np0005654373.novalocal systemd[1]: Started Session c91 of User root. Mar 21 14:30:58 np0005654373.novalocal sudo[99490]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:30:58 np0005654373.novalocal sudo[99490]: pam_unix(sudo:session): session closed for user root Mar 21 14:30:58 np0005654373.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Mar 21 14:30:58 np0005654373.novalocal sudo[99496]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:30:58 np0005654373.novalocal systemd[1]: Started Session c92 of User root. Mar 21 14:30:58 np0005654373.novalocal sudo[99496]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:30:59 np0005654373.novalocal sudo[99496]: pam_unix(sudo:session): session closed for user root Mar 21 14:30:59 np0005654373.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Mar 21 14:30:59 np0005654373.novalocal sudo[99500]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:30:59 np0005654373.novalocal systemd[1]: Started Session c93 of User root. Mar 21 14:30:59 np0005654373.novalocal sudo[99500]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:30:59 np0005654373.novalocal sudo[99500]: pam_unix(sudo:session): session closed for user root Mar 21 14:30:59 np0005654373.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Mar 21 14:30:59 np0005654373.novalocal sudo[99505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:30:59 np0005654373.novalocal systemd[1]: Started Session c94 of User root. Mar 21 14:30:59 np0005654373.novalocal sudo[99505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:30:59 np0005654373.novalocal sudo[99505]: pam_unix(sudo:session): session closed for user root Mar 21 14:30:59 np0005654373.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Mar 21 14:31:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:31:00 np0005654373.novalocal sudo[99515]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:31:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:31:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:31:00 np0005654373.novalocal systemd[1]: Started Session c95 of User root. Mar 21 14:31:00 np0005654373.novalocal sudo[99515]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:00 np0005654373.novalocal sudo[99515]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:00 np0005654373.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Mar 21 14:31:00 np0005654373.novalocal sudo[99529]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-98004f49-a431-47a8-972a-587d0548ea3e --snapshot cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:31:00 np0005654373.novalocal systemd[1]: Started Session c96 of User root. Mar 21 14:31:00 np0005654373.novalocal sudo[99529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:01 np0005654373.novalocal dmeventd[91396]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Mar 21 14:31:01 np0005654373.novalocal dmeventd[91396]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Mar 21 14:31:01 np0005654373.novalocal sudo[99529]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:01 np0005654373.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Mar 21 14:31:01 np0005654373.novalocal sudo[99542]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-98004f49-a431-47a8-972a-587d0548ea3e Mar 21 14:31:01 np0005654373.novalocal systemd[1]: Started Session c97 of User root. Mar 21 14:31:01 np0005654373.novalocal sudo[99542]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:01 np0005654373.novalocal sudo[99542]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:01 np0005654373.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Mar 21 14:31:08 np0005654373.novalocal sshd-session[99558]: Connection reset by authenticating user root 45.148.10.151 port 42136 [preauth] Mar 21 14:31:09 np0005654373.novalocal sudo[99562]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpw4l3ja6n/privsep.sock Mar 21 14:31:09 np0005654373.novalocal systemd[1]: Started Session c98 of User root. Mar 21 14:31:09 np0005654373.novalocal sudo[99562]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Mar 21 14:31:10 np0005654373.novalocal sudo[99562]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:10 np0005654373.novalocal sudo[99580]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-98004f49-a431-47a8-972a-587d0548ea3e Mar 21 14:31:10 np0005654373.novalocal systemd[1]: Started Session c99 of User root. Mar 21 14:31:10 np0005654373.novalocal sudo[99580]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:10 np0005654373.novalocal sudo[99580]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:10 np0005654373.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Mar 21 14:31:10 np0005654373.novalocal sudo[99585]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-98004f49-a431-47a8-972a-587d0548ea3e iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e DC84CHATncA8F8hw3K93 BJ8NzJ34wPjvEY2T False -p3260 -a::1 Mar 21 14:31:10 np0005654373.novalocal systemd[1]: Started Session c100 of User root. Mar 21 14:31:10 np0005654373.novalocal sudo[99585]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:11 np0005654373.novalocal sudo[99585]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:11 np0005654373.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Mar 21 14:31:11 np0005654373.novalocal sudo[99593]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:31:11 np0005654373.novalocal systemd[1]: Started Session c101 of User root. Mar 21 14:31:11 np0005654373.novalocal sudo[99593]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:11 np0005654373.novalocal sudo[99593]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:11 np0005654373.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Mar 21 14:31:11 np0005654373.novalocal sudo[99598]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:11 np0005654373.novalocal systemd[1]: Started Session c102 of User root. Mar 21 14:31:11 np0005654373.novalocal sudo[99598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:12 np0005654373.novalocal sudo[99598]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:12 np0005654373.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Mar 21 14:31:12 np0005654373.novalocal sudo[99603]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e DC84CHATncA8F8hw3K93 BJ8NzJ34wPjvEY2T iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:31:12 np0005654373.novalocal systemd[1]: Started Session c103 of User root. Mar 21 14:31:12 np0005654373.novalocal sudo[99603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:12 np0005654373.novalocal sudo[99603]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:12 np0005654373.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Mar 21 14:31:12 np0005654373.novalocal sudo[99609]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:12 np0005654373.novalocal systemd[1]: Started Session c104 of User root. Mar 21 14:31:12 np0005654373.novalocal sudo[99609]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:13 np0005654373.novalocal sudo[99609]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:13 np0005654373.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Mar 21 14:31:15 np0005654373.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Mar 21 14:31:15 np0005654373.novalocal iscsid[75625]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e, portal: ::1,3260] through [iface: default] is operational now Mar 21 14:31:15 np0005654373.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 21 14:31:15 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Mar 21 14:31:15 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014051b20e561b6884b67a22233011 port group 0 rel port 1 Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 21 14:31:15 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 21 14:31:15 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:15 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:31:15 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:15 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:31:15 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:15 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:31:15 np0005654373.novalocal kernel: sda: sda1 sda15 Mar 21 14:31:15 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Mar 21 14:31:16 np0005654373.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Mar 21 14:31:16 np0005654373.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Mar 21 14:31:16 np0005654373.novalocal systemd[1]: Starting libvirt secret daemon... Mar 21 14:31:16 np0005654373.novalocal systemd[1]: Started libvirt secret daemon. Mar 21 14:31:18 np0005654373.novalocal sudo[99682]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmpxb8ftpul/privsep.sock Mar 21 14:31:18 np0005654373.novalocal systemd[1]: Started Session c105 of User root. Mar 21 14:31:18 np0005654373.novalocal sudo[99682]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Mar 21 14:31:18 np0005654373.novalocal sudo[99682]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:20 np0005654373.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 21 14:31:20 np0005654373.novalocal kernel: tap9c8b2c91-14: entered promiscuous mode Mar 21 14:31:20 np0005654373.novalocal NetworkManager[871]: [1774117880.6863] manager: (tap9c8b2c91-14): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Mar 21 14:31:20 np0005654373.novalocal virtqemud[96706]: Domain id=1 name='instance-00000001' uuid=d0e749ff-5fb2-4e49-86a3-a7a0d3b49f06 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:31:20 np0005654373.novalocal virtqemud[96706]: Domain id=1 name='instance-00000001' uuid=d0e749ff-5fb2-4e49-86a3-a7a0d3b49f06 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:31:20 np0005654373.novalocal systemd-machined[93279]: New machine qemu-1-instance-00000001. Mar 21 14:31:20 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Mar 21 14:31:20 np0005654373.novalocal systemd-udevd[99712]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:31:20 np0005654373.novalocal NetworkManager[871]: [1774117880.7900] device (tap9c8b2c91-14): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:31:20 np0005654373.novalocal NetworkManager[871]: [1774117880.7905] device (tap9c8b2c91-14): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:31:20 np0005654373.novalocal sudo[99726]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpr1ixx76z/privsep.sock Mar 21 14:31:20 np0005654373.novalocal systemd[1]: Started Session c106 of User root. Mar 21 14:31:20 np0005654373.novalocal sudo[99726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:31:21 np0005654373.novalocal sudo[99726]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:22 np0005654373.novalocal systemd-udevd[99711]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:31:22 np0005654373.novalocal NetworkManager[871]: [1774117882.4781] manager: (tapaa6980bc-e0): new Veth device (/org/freedesktop/NetworkManager/Devices/10) Mar 21 14:31:22 np0005654373.novalocal NetworkManager[871]: [1774117882.5249] device (tapaa6980bc-e0): carrier: link connected Mar 21 14:31:22 np0005654373.novalocal kernel: tapaa6980bc-e0: entered promiscuous mode Mar 21 14:31:22 np0005654373.novalocal sudo[99771]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-aa6980bc-ee02-467a-a975-b12f14182d55 env PROCESS_TAG=haproxy-aa6980bc-ee02-467a-a975-b12f14182d55 haproxy -f /var/lib/neutron/ovn-metadata-proxy/aa6980bc-ee02-467a-a975-b12f14182d55.conf Mar 21 14:31:22 np0005654373.novalocal systemd[1]: Started Session c107 of User root. Mar 21 14:31:22 np0005654373.novalocal sudo[99771]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:31:22 np0005654373.novalocal sudo[99771]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:30 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:31:31 np0005654373.novalocal sudo[99803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:31:31 np0005654373.novalocal systemd[1]: Started Session c108 of User root. Mar 21 14:31:31 np0005654373.novalocal sudo[99803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:31 np0005654373.novalocal sudo[99803]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:31 np0005654373.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Mar 21 14:31:31 np0005654373.novalocal sudo[99807]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Wp3UCrAhZ5MLai4K54LG cegMHaAQHrJHs5Q4 False -p3260 -a::1 Mar 21 14:31:31 np0005654373.novalocal systemd[1]: Started Session c109 of User root. Mar 21 14:31:31 np0005654373.novalocal sudo[99807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:31 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:31:31 np0005654373.novalocal sudo[99807]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:31 np0005654373.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Mar 21 14:31:31 np0005654373.novalocal sudo[99818]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:31:31 np0005654373.novalocal systemd[1]: Started Session c110 of User root. Mar 21 14:31:31 np0005654373.novalocal sudo[99818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:32 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Mar 21 14:31:32 np0005654373.novalocal sudo[99818]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:32 np0005654373.novalocal systemd[1]: session-c110.scope: Deactivated successfully. Mar 21 14:31:32 np0005654373.novalocal sudo[99832]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:32 np0005654373.novalocal systemd[1]: Started Session c111 of User root. Mar 21 14:31:32 np0005654373.novalocal sudo[99832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:32 np0005654373.novalocal sudo[99832]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:32 np0005654373.novalocal systemd[1]: session-c111.scope: Deactivated successfully. Mar 21 14:31:33 np0005654373.novalocal sudo[99837]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Wp3UCrAhZ5MLai4K54LG cegMHaAQHrJHs5Q4 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:31:33 np0005654373.novalocal systemd[1]: Started Session c112 of User root. Mar 21 14:31:33 np0005654373.novalocal sudo[99837]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 290c08d0-d32c-4edf-a9b2-21cfd81b6e56 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal sudo[99837]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:33 np0005654373.novalocal systemd[1]: session-c112.scope: Deactivated successfully. Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l a705c92f-0f95-4843-aaac-3be8e0f5162c Mar 21 14:31:33 np0005654373.novalocal sudo[99846]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal systemd[1]: Started Session c113 of User root. Mar 21 14:31:33 np0005654373.novalocal sudo[99846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: failed to retrieve rpm info for path '/dev/vda1': Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 03b324a6-3cd0-4254-ada8-f4777b94d088 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 1faace30-f34b-45e2-95e5-993d4ddb6e88 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 905aa3ff-9734-4b9f-bfe8-1d80b5d8b21a Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 468dc2fe-cb46-470c-af8b-1e171c206134 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 432e2b51-7f7d-47f2-bf84-751d74aeda92 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l d9c92759-405a-4908-8954-c3db26c39913 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-dn25Li. For complete SELinux messages run: sealert -l cc8e7535-aba7-4280-8ea0-012c668b5f3c Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-dn25Li. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-dn25Li file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 282811e6-aea8-45c9-afab-8e85810d3294 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 34d39080-ca27-466f-9554-c50540758513 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 2086b009-b7bf-4052-bda2-d51ab447fbd7 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 385f6fca-f3ab-4d7a-ad33-db55dce08574 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l d80d283e-6488-440f-bde2-d6c80fdfaf94 Mar 21 14:31:33 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:34 np0005654373.novalocal sudo[99846]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:34 np0005654373.novalocal systemd[1]: session-c113.scope: Deactivated successfully. Mar 21 14:31:34 np0005654373.novalocal kernel: scsi host3: iSCSI Initiator over TCP/IP Mar 21 14:31:34 np0005654373.novalocal iscsid[75625]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967, portal: ::1,3260] through [iface: default] is operational now Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:31:34 np0005654373.novalocal kernel: scsi 3:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 21 14:31:34 np0005654373.novalocal kernel: scsi 3:0:0:0: alua: supports implicit and explicit TPGS Mar 21 14:31:34 np0005654373.novalocal kernel: scsi 3:0:0:0: alua: device naa.6001405f950398400f440a88d24b99b9 port group 0 rel port 2 Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: Attached scsi generic sg2 type 0 Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] Write Protect is off Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] Mode Sense: 43 00 10 08 Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 21 14:31:34 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] Preferred minimum I/O size 65536 bytes Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] Optimal transfer size 65536 bytes Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: alua: transition timeout set to 60 seconds Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 21 14:31:34 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:34 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:31:34 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:34 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:31:34 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:34 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:31:34 np0005654373.novalocal kernel: sdb: sdb1 sdb15 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:31:34 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] Attached SCSI disk Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 335350d8-0954-426f-8314-2e6a4a50804f Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 888481b2-3da4-431d-b609-22bf2b428f34 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l d3b85409-791f-4fd0-a522-398423a415da Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. For complete SELinux messages run: sealert -l 4649b4cc-a021-4e68-b08a-2b363f7e6e76 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b1fcb22a-5b70-4ce1-ba88-162477c931d7 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 419408de-89cf-420f-8034-4e71b9bd4a28 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 59824d56-cb80-4830-a3dc-b7c946d0226d Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 7261cfa3-40ba-4d1d-97e4-7488f2a72317 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 39837b07-7e04-418e-984b-8dc178261948 Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:34 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. For complete SELinux messages run: sealert -l 604cd4ff-484e-4c1d-b075-d9540377b9f6 Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l d3b85409-791f-4fd0-a522-398423a415da Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: failed to retrieve rpm info for path '/sys/class/scsi_host/host3/scan': Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host3/scan. For complete SELinux messages run: sealert -l 1368c8c1-88e8-4dfe-9bc2-47f345dea33b Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host3/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host3/scan. For complete SELinux messages run: sealert -l bff3664b-8ef6-4861-aa98-d1153de6da90 Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host3/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host3/scan. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host3/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:31:35 np0005654373.novalocal sudo[99909]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sdb Mar 21 14:31:35 np0005654373.novalocal systemd[1]: Started Session c114 of User root. Mar 21 14:31:35 np0005654373.novalocal sudo[99909]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: failed to retrieve rpm info for path '/dev/sda1': Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda1. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 203d86af-05db-4a7d-870c-c9ada9dc4e28 Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:31:35 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:31:36 np0005654373.novalocal sudo[99909]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:31:36 np0005654373.novalocal systemd[1]: session-c114.scope: Deactivated successfully. Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 50b2af88-e8c2-4661-a5e2-60e8f84c2ebb Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l c6a777ef-0b40-4657-a618-d9f0ba4a8ae0 Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sdb. For complete SELinux messages run: sealert -l c6cb1e94-ee9c-4733-9bd5-e1df880b2f71 Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sdb. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: failed to retrieve rpm info for path '/dev/sdb': Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 03b324a6-3cd0-4254-ada8-f4777b94d088 Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:36 np0005654373.novalocal sudo[99923]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sdb Mar 21 14:31:36 np0005654373.novalocal systemd[1]: Started Session c115 of User root. Mar 21 14:31:36 np0005654373.novalocal sudo[99923]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 1faace30-f34b-45e2-95e5-993d4ddb6e88 Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:31:36 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:31:36 np0005654373.novalocal kernel: tap9c8b2c91-14 (unregistering): left promiscuous mode Mar 21 14:31:36 np0005654373.novalocal NetworkManager[871]: [1774117896.9219] device (tap9c8b2c91-14): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:31:36 np0005654373.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Mar 21 14:31:36 np0005654373.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 10.983s CPU time. Mar 21 14:31:36 np0005654373.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Mar 21 14:31:36 np0005654373.novalocal systemd-machined[93279]: Machine qemu-1-instance-00000001 terminated. Mar 21 14:31:36 np0005654373.novalocal kernel: tapaa6980bc-e0: left promiscuous mode Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:31:37 np0005654373.novalocal sudo[99923]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:37 np0005654373.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sdb. For complete SELinux messages run: sealert -l c6cb1e94-ee9c-4733-9bd5-e1df880b2f71 Mar 21 14:31:37 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2daa6980bc\x2dee02\x2d467a\x2da975\x2db12f14182d55.mount: Deactivated successfully. Mar 21 14:31:37 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:31:37 np0005654373.novalocal kernel: sda: sda1 sda15 Mar 21 14:31:37 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:31:37 np0005654373.novalocal kernel: sda: sda1 sda15 Mar 21 14:31:37 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:31:37 np0005654373.novalocal kernel: sda: sda1 sda15 Mar 21 14:31:37 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Mar 21 14:31:37 np0005654373.novalocal kernel: GPT:229375 != 2097151 Mar 21 14:31:37 np0005654373.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Mar 21 14:31:37 np0005654373.novalocal kernel: sda: sda1 sda15 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l d3b85409-791f-4fd0-a522-398423a415da Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 335350d8-0954-426f-8314-2e6a4a50804f Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 888481b2-3da4-431d-b609-22bf2b428f34 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. For complete SELinux messages run: sealert -l 4649b4cc-a021-4e68-b08a-2b363f7e6e76 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b1fcb22a-5b70-4ce1-ba88-162477c931d7 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sdb. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 03b324a6-3cd0-4254-ada8-f4777b94d088 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 1faace30-f34b-45e2-95e5-993d4ddb6e88 Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:31:37 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Mar 21 14:31:37 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: Detached Mar 21 14:31:37 np0005654373.novalocal kernel: sd 3:0:0:0: [sdb] Synchronizing SCSI cache Mar 21 14:31:37 np0005654373.novalocal iscsid[75625]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e, portal: ::1,3260] through [iface: default] is shutdown. Mar 21 14:31:37 np0005654373.novalocal kernel: scsi 3:0:0:0: alua: Detached Mar 21 14:31:37 np0005654373.novalocal iscsid[75625]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967, portal: ::1,3260] through [iface: default] is shutdown. Mar 21 14:31:37 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:31:38 np0005654373.novalocal sudo[100057]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:31:38 np0005654373.novalocal systemd[1]: Started Session c116 of User root. Mar 21 14:31:38 np0005654373.novalocal sudo[100057]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l d3b85409-791f-4fd0-a522-398423a415da Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. For complete SELinux messages run: sealert -l 4649b4cc-a021-4e68-b08a-2b363f7e6e76 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 604cd4ff-484e-4c1d-b075-d9540377b9f6 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. For complete SELinux messages run: sealert -l 419408de-89cf-420f-8034-4e71b9bd4a28 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l d6c6ac87-fa89-4f2a-9876-c94c29cbea6e Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 08fb82fa-8e03-4a98-acd1-9871f66486d9 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. For complete SELinux messages run: sealert -l 6859792b-6812-490c-af19-f78008d58dd5 Mar 21 14:31:38 np0005654373.novalocal setroubleshoot[99800]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:31:38 np0005654373.novalocal sudo[100057]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:38 np0005654373.novalocal systemd[1]: session-c116.scope: Deactivated successfully. Mar 21 14:31:38 np0005654373.novalocal sudo[100069]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:38 np0005654373.novalocal systemd[1]: Started Session c117 of User root. Mar 21 14:31:38 np0005654373.novalocal sudo[100069]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:39 np0005654373.novalocal sudo[100069]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:39 np0005654373.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Mar 21 14:31:39 np0005654373.novalocal sudo[100076]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:31:39 np0005654373.novalocal systemd[1]: Started Session c118 of User root. Mar 21 14:31:39 np0005654373.novalocal sudo[100076]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:39 np0005654373.novalocal sudo[100076]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:39 np0005654373.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Mar 21 14:31:39 np0005654373.novalocal sudo[100081]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:31:39 np0005654373.novalocal systemd[1]: Started Session c119 of User root. Mar 21 14:31:39 np0005654373.novalocal sudo[100081]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:40 np0005654373.novalocal sudo[100081]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:40 np0005654373.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Mar 21 14:31:40 np0005654373.novalocal sudo[100122]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:40 np0005654373.novalocal systemd[1]: Started Session c120 of User root. Mar 21 14:31:40 np0005654373.novalocal sudo[100122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:40 np0005654373.novalocal sudo[100122]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:40 np0005654373.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Mar 21 14:31:40 np0005654373.novalocal sudo[100127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:31:40 np0005654373.novalocal systemd[1]: Started Session c121 of User root. Mar 21 14:31:40 np0005654373.novalocal sudo[100127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:41 np0005654373.novalocal sudo[100127]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:41 np0005654373.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Mar 21 14:31:41 np0005654373.novalocal sudo[100132]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:41 np0005654373.novalocal systemd[1]: Started Session c122 of User root. Mar 21 14:31:41 np0005654373.novalocal sudo[100132]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:41 np0005654373.novalocal sudo[100138]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpdca__m4r/privsep.sock Mar 21 14:31:41 np0005654373.novalocal systemd[1]: Started Session c123 of User root. Mar 21 14:31:41 np0005654373.novalocal sudo[100138]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Mar 21 14:31:41 np0005654373.novalocal sudo[100132]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:41 np0005654373.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Mar 21 14:31:41 np0005654373.novalocal sudo[100144]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:31:41 np0005654373.novalocal systemd[1]: Started Session c124 of User root. Mar 21 14:31:41 np0005654373.novalocal sudo[100144]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:41 np0005654373.novalocal sudo[100138]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:42 np0005654373.novalocal sudo[100144]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:42 np0005654373.novalocal systemd[1]: session-c124.scope: Deactivated successfully. Mar 21 14:31:42 np0005654373.novalocal sudo[100155]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-98004f49-a431-47a8-972a-587d0548ea3e Mar 21 14:31:42 np0005654373.novalocal systemd[1]: Started Session c125 of User root. Mar 21 14:31:42 np0005654373.novalocal sudo[100155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:42 np0005654373.novalocal sudo[100155]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:42 np0005654373.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Mar 21 14:31:42 np0005654373.novalocal sudo[100171]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:31:42 np0005654373.novalocal systemd[1]: Started Session c126 of User root. Mar 21 14:31:42 np0005654373.novalocal sudo[100171]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:43 np0005654373.novalocal sudo[100171]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:43 np0005654373.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Mar 21 14:31:43 np0005654373.novalocal sudo[100178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:31:43 np0005654373.novalocal systemd[1]: Started Session c127 of User root. Mar 21 14:31:43 np0005654373.novalocal sudo[100178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:44 np0005654373.novalocal sudo[100178]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:44 np0005654373.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Mar 21 14:31:44 np0005654373.novalocal sudo[100183]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-98004f49-a431-47a8-972a-587d0548ea3e Mar 21 14:31:44 np0005654373.novalocal systemd[1]: Started Session c128 of User root. Mar 21 14:31:44 np0005654373.novalocal sudo[100183]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:44 np0005654373.novalocal kernel: tap3736cd7b-f3: entered promiscuous mode Mar 21 14:31:44 np0005654373.novalocal NetworkManager[871]: [1774117904.4947] manager: (tap3736cd7b-f3): new Tun device (/org/freedesktop/NetworkManager/Devices/11) Mar 21 14:31:44 np0005654373.novalocal virtqemud[96706]: Domain id=2 name='instance-00000002' uuid=a0918e95-5c7f-4d01-89bb-aaf8b15976c4 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:31:44 np0005654373.novalocal virtqemud[96706]: Domain id=2 name='instance-00000002' uuid=a0918e95-5c7f-4d01-89bb-aaf8b15976c4 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:31:44 np0005654373.novalocal systemd-machined[93279]: New machine qemu-2-instance-00000002. Mar 21 14:31:44 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Mar 21 14:31:44 np0005654373.novalocal systemd-udevd[100209]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:31:44 np0005654373.novalocal NetworkManager[871]: [1774117904.6002] device (tap3736cd7b-f3): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:31:44 np0005654373.novalocal NetworkManager[871]: [1774117904.6006] device (tap3736cd7b-f3): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:31:44 np0005654373.novalocal NetworkManager[871]: [1774117904.6340] manager: (tap735cea6a-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Mar 21 14:31:44 np0005654373.novalocal sudo[100183]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:44 np0005654373.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Mar 21 14:31:44 np0005654373.novalocal sudo[100224]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-98004f49-a431-47a8-972a-587d0548ea3e Mar 21 14:31:44 np0005654373.novalocal NetworkManager[871]: [1774117904.6780] device (tap735cea6a-d0): carrier: link connected Mar 21 14:31:44 np0005654373.novalocal systemd[1]: Started Session c129 of User root. Mar 21 14:31:44 np0005654373.novalocal sudo[100224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:44 np0005654373.novalocal kernel: tap735cea6a-d0: entered promiscuous mode Mar 21 14:31:44 np0005654373.novalocal sudo[100253]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-735cea6a-dc39-41f9-9837-f0cd48f67fe7 env PROCESS_TAG=haproxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/735cea6a-dc39-41f9-9837-f0cd48f67fe7.conf Mar 21 14:31:44 np0005654373.novalocal systemd[1]: Started Session c130 of User root. Mar 21 14:31:44 np0005654373.novalocal sudo[100253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:31:45 np0005654373.novalocal sudo[100224]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:45 np0005654373.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Mar 21 14:31:45 np0005654373.novalocal sudo[100260]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-98004f49-a431-47a8-972a-587d0548ea3e Mar 21 14:31:45 np0005654373.novalocal sudo[100253]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:45 np0005654373.novalocal systemd[1]: Started Session c131 of User root. Mar 21 14:31:45 np0005654373.novalocal sudo[100260]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:45 np0005654373.novalocal sudo[100260]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:45 np0005654373.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Mar 21 14:31:45 np0005654373.novalocal sudo[100273]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:31:45 np0005654373.novalocal systemd[1]: Started Session c132 of User root. Mar 21 14:31:45 np0005654373.novalocal sudo[100273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:46 np0005654373.novalocal sudo[100273]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:46 np0005654373.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Mar 21 14:31:46 np0005654373.novalocal sudo[100278]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:31:46 np0005654373.novalocal systemd[1]: Started Session c133 of User root. Mar 21 14:31:46 np0005654373.novalocal sudo[100278]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:46 np0005654373.novalocal sudo[100278]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:46 np0005654373.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Mar 21 14:31:46 np0005654373.novalocal sudo[100282]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:31:46 np0005654373.novalocal systemd[1]: Started Session c134 of User root. Mar 21 14:31:46 np0005654373.novalocal sudo[100282]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:46 np0005654373.novalocal sudo[100282]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:46 np0005654373.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Mar 21 14:31:46 np0005654373.novalocal sudo[100286]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:31:46 np0005654373.novalocal systemd[1]: Started Session c135 of User root. Mar 21 14:31:46 np0005654373.novalocal sudo[100286]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:47 np0005654373.novalocal sudo[100286]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:47 np0005654373.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Mar 21 14:31:48 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Mar 21 14:31:48 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.248s CPU time. Mar 21 14:31:48 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:31:48 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 3.989s CPU time. Mar 21 14:31:58 np0005654373.novalocal sudo[100326]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:31:58 np0005654373.novalocal systemd[1]: Started Session c136 of User root. Mar 21 14:31:58 np0005654373.novalocal sudo[100326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:58 np0005654373.novalocal sudo[100326]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:58 np0005654373.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Mar 21 14:31:58 np0005654373.novalocal sudo[100330]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:31:58 np0005654373.novalocal systemd[1]: Started Session c137 of User root. Mar 21 14:31:58 np0005654373.novalocal sudo[100330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:59 np0005654373.novalocal sudo[100330]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:59 np0005654373.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Mar 21 14:31:59 np0005654373.novalocal sudo[100334]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:31:59 np0005654373.novalocal systemd[1]: Started Session c138 of User root. Mar 21 14:31:59 np0005654373.novalocal sudo[100334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:59 np0005654373.novalocal sudo[100334]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:59 np0005654373.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Mar 21 14:31:59 np0005654373.novalocal sudo[100338]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:31:59 np0005654373.novalocal systemd[1]: Started Session c139 of User root. Mar 21 14:31:59 np0005654373.novalocal sudo[100338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:31:59 np0005654373.novalocal sudo[100338]: pam_unix(sudo:session): session closed for user root Mar 21 14:31:59 np0005654373.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Mar 21 14:32:02 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:32:02 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:32:02 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:32:02 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:32:03 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:32:03 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Mar 21 14:32:04 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 3433cf4f-f331-4cfd-9913-d287e4a7f283 Mar 21 14:32:04 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:05 np0005654373.novalocal setroubleshoot[100350]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41': Mar 21 14:32:05 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 3be4646d-46df-4fdc-8586-651580bb5cdc Mar 21 14:32:05 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:05 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 2a30f5a5-d0e8-4d1a-855d-0326f2c5369d Mar 21 14:32:05 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:05 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l d04534a6-cbd8-4e04-bdd7-b38363e6fefd Mar 21 14:32:05 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:05 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48332 [21/Mar/2026:14:32:01.915] listener listener/metadata 0/0/0/3409/3409 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:32:06 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 3433cf4f-f331-4cfd-9913-d287e4a7f283 Mar 21 14:32:06 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from read access on the file 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:06 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 3be4646d-46df-4fdc-8586-651580bb5cdc Mar 21 14:32:06 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:06 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l 2a30f5a5-d0e8-4d1a-855d-0326f2c5369d Mar 21 14:32:06 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:07 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. For complete SELinux messages run: sealert -l d04534a6-cbd8-4e04-bdd7-b38363e6fefd Mar 21 14:32:07 np0005654373.novalocal setroubleshoot[100350]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 9ebe551578d571d3e4b8d9ee28c480a23b8a021024c0f1921723d37bf0646a41 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48336 [21/Mar/2026:14:32:05.391] listener listener/metadata 0/0/0/1948/1948 200 115 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal kernel: tap85ae4393-1e: entered promiscuous mode Mar 21 14:32:07 np0005654373.novalocal NetworkManager[871]: [1774117927.3800] manager: (tap85ae4393-1e): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48350 [21/Mar/2026:14:32:07.374] listener listener/metadata 0/0/0/15/15 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal virtqemud[96706]: Domain id=3 name='instance-00000003' uuid=1da80522-a06d-4f94-a25d-647cf8dadafb is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:32:07 np0005654373.novalocal virtqemud[96706]: Domain id=3 name='instance-00000003' uuid=1da80522-a06d-4f94-a25d-647cf8dadafb is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48356 [21/Mar/2026:14:32:07.437] listener listener/metadata 0/0/0/26/26 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal systemd-udevd[100413]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:32:07 np0005654373.novalocal systemd-machined[93279]: New machine qemu-3-instance-00000003. Mar 21 14:32:07 np0005654373.novalocal NetworkManager[871]: [1774117927.4754] device (tap85ae4393-1e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:32:07 np0005654373.novalocal NetworkManager[871]: [1774117927.4769] device (tap85ae4393-1e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:32:07 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Mar 21 14:32:07 np0005654373.novalocal NetworkManager[871]: [1774117927.5360] manager: (tapbcecbd2a-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Mar 21 14:32:07 np0005654373.novalocal systemd-udevd[100416]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48360 [21/Mar/2026:14:32:07.527] listener listener/metadata 0/0/0/13/13 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal NetworkManager[871]: [1774117927.5853] device (tapbcecbd2a-d0): carrier: link connected Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48362 [21/Mar/2026:14:32:07.591] listener listener/metadata 0/0/0/20/20 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48378 [21/Mar/2026:14:32:07.655] listener listener/metadata 0/0/0/12/12 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal kernel: tapbcecbd2a-d0: entered promiscuous mode Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48382 [21/Mar/2026:14:32:07.713] listener listener/metadata 0/0/0/20/20 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal sudo[100463]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-bcecbd2a-df46-44f4-8826-1a1a89632af8 env PROCESS_TAG=haproxy-bcecbd2a-df46-44f4-8826-1a1a89632af8 haproxy -f /var/lib/neutron/ovn-metadata-proxy/bcecbd2a-df46-44f4-8826-1a1a89632af8.conf Mar 21 14:32:07 np0005654373.novalocal systemd[1]: Started Session c140 of User root. Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48388 [21/Mar/2026:14:32:07.778] listener listener/metadata 0/0/0/11/11 200 151 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal sudo[100463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48394 [21/Mar/2026:14:32:07.826] listener listener/metadata 0/0/0/10/10 200 151 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48406 [21/Mar/2026:14:32:07.876] listener listener/metadata 0/0/0/11/11 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Mar 21 14:32:07 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48418 [21/Mar/2026:14:32:07.943] listener listener/metadata 0/0/0/11/11 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Mar 21 14:32:08 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48428 [21/Mar/2026:14:32:07.988] listener listener/metadata 0/0/0/13/13 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Mar 21 14:32:08 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48440 [21/Mar/2026:14:32:08.026] listener listener/metadata 0/0/0/8/8 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Mar 21 14:32:08 np0005654373.novalocal sudo[100463]: pam_unix(sudo:session): session closed for user root Mar 21 14:32:08 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48454 [21/Mar/2026:14:32:08.072] listener listener/metadata 0/0/0/23/23 200 151 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Mar 21 14:32:08 np0005654373.novalocal haproxy-metadata-proxy-735cea6a-dc39-41f9-9837-f0cd48f67fe7[100261]: 10.100.0.7:48458 [21/Mar/2026:14:32:08.137] listener listener/metadata 0/0/0/16/16 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Mar 21 14:32:17 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Mar 21 14:32:17 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.148s CPU time. Mar 21 14:32:17 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:32:17 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 1.382s CPU time. Mar 21 14:32:22 np0005654373.novalocal kernel: tap85ae4393-1e (unregistering): left promiscuous mode Mar 21 14:32:22 np0005654373.novalocal NetworkManager[871]: [1774117942.4365] device (tap85ae4393-1e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:32:22 np0005654373.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Mar 21 14:32:22 np0005654373.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 11.834s CPU time. Mar 21 14:32:22 np0005654373.novalocal systemd-machined[93279]: Machine qemu-3-instance-00000003 terminated. Mar 21 14:32:22 np0005654373.novalocal kernel: tapbcecbd2a-d0: left promiscuous mode Mar 21 14:32:22 np0005654373.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Mar 21 14:32:22 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2dbcecbd2a\x2ddf46\x2d44f4\x2d8826\x2d1a1a89632af8.mount: Deactivated successfully. Mar 21 14:32:35 np0005654373.novalocal kernel: tap3736cd7b-f3 (unregistering): left promiscuous mode Mar 21 14:32:35 np0005654373.novalocal NetworkManager[871]: [1774117955.4532] device (tap3736cd7b-f3): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:32:35 np0005654373.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Mar 21 14:32:35 np0005654373.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 19.798s CPU time. Mar 21 14:32:35 np0005654373.novalocal systemd-machined[93279]: Machine qemu-2-instance-00000002 terminated. Mar 21 14:32:35 np0005654373.novalocal kernel: tap735cea6a-d0: left promiscuous mode Mar 21 14:32:35 np0005654373.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Mar 21 14:32:35 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2d735cea6a\x2ddc39\x2d41f9\x2d9837\x2df0cd48f67fe7.mount: Deactivated successfully. Mar 21 14:32:53 np0005654373.novalocal NetworkManager[871]: [1774117973.5927] manager: (tap205a08b1-fd): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Mar 21 14:32:53 np0005654373.novalocal kernel: tap205a08b1-fd: entered promiscuous mode Mar 21 14:32:53 np0005654373.novalocal virtqemud[96706]: Domain id=4 name='instance-00000004' uuid=f4cd7cf2-9fc1-4777-920d-8043ae3f8e00 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:32:53 np0005654373.novalocal virtqemud[96706]: Domain id=4 name='instance-00000004' uuid=f4cd7cf2-9fc1-4777-920d-8043ae3f8e00 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:32:53 np0005654373.novalocal systemd-udevd[100686]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:32:53 np0005654373.novalocal systemd-machined[93279]: New machine qemu-4-instance-00000004. Mar 21 14:32:53 np0005654373.novalocal NetworkManager[871]: [1774117973.6433] device (tap205a08b1-fd): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:32:53 np0005654373.novalocal NetworkManager[871]: [1774117973.6438] device (tap205a08b1-fd): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:32:53 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Mar 21 14:32:53 np0005654373.novalocal NetworkManager[871]: [1774117973.6823] manager: (tapa72b6e57-90): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Mar 21 14:32:53 np0005654373.novalocal systemd-udevd[100690]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:32:53 np0005654373.novalocal NetworkManager[871]: [1774117973.7338] device (tapa72b6e57-90): carrier: link connected Mar 21 14:32:53 np0005654373.novalocal kernel: tapa72b6e57-90: entered promiscuous mode Mar 21 14:32:53 np0005654373.novalocal sudo[100732]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-a72b6e57-9ec8-4dd1-811d-3ae519cc9739 env PROCESS_TAG=haproxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739 haproxy -f /var/lib/neutron/ovn-metadata-proxy/a72b6e57-9ec8-4dd1-811d-3ae519cc9739.conf Mar 21 14:32:53 np0005654373.novalocal systemd[1]: Started Session c141 of User root. Mar 21 14:32:53 np0005654373.novalocal sudo[100732]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:32:54 np0005654373.novalocal sudo[100732]: pam_unix(sudo:session): session closed for user root Mar 21 14:32:58 np0005654373.novalocal sudo[100749]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:32:58 np0005654373.novalocal systemd[1]: Started Session c142 of User root. Mar 21 14:32:58 np0005654373.novalocal sudo[100749]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:32:58 np0005654373.novalocal sudo[100749]: pam_unix(sudo:session): session closed for user root Mar 21 14:32:58 np0005654373.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Mar 21 14:32:58 np0005654373.novalocal sudo[100753]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:32:58 np0005654373.novalocal systemd[1]: Started Session c143 of User root. Mar 21 14:32:58 np0005654373.novalocal sudo[100753]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:32:59 np0005654373.novalocal sudo[100753]: pam_unix(sudo:session): session closed for user root Mar 21 14:32:59 np0005654373.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Mar 21 14:32:59 np0005654373.novalocal sudo[100757]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:32:59 np0005654373.novalocal systemd[1]: Started Session c144 of User root. Mar 21 14:32:59 np0005654373.novalocal sudo[100757]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:32:59 np0005654373.novalocal sudo[100757]: pam_unix(sudo:session): session closed for user root Mar 21 14:32:59 np0005654373.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Mar 21 14:32:59 np0005654373.novalocal sudo[100762]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:32:59 np0005654373.novalocal systemd[1]: Started Session c145 of User root. Mar 21 14:32:59 np0005654373.novalocal sudo[100762]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:33:00 np0005654373.novalocal sudo[100762]: pam_unix(sudo:session): session closed for user root Mar 21 14:33:00 np0005654373.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Mar 21 14:33:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:33:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:33:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:33:06 np0005654373.novalocal kernel: tap1bddffe9-e0: entered promiscuous mode Mar 21 14:33:06 np0005654373.novalocal NetworkManager[871]: [1774117986.8127] manager: (tap1bddffe9-e0): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Mar 21 14:33:06 np0005654373.novalocal virtqemud[96706]: Domain id=5 name='instance-00000005' uuid=e4a76fb9-43d2-4dc9-92d1-20406d9eb9ca is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:33:06 np0005654373.novalocal virtqemud[96706]: Domain id=5 name='instance-00000005' uuid=e4a76fb9-43d2-4dc9-92d1-20406d9eb9ca is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:33:06 np0005654373.novalocal systemd-machined[93279]: New machine qemu-5-instance-00000005. Mar 21 14:33:06 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Mar 21 14:33:06 np0005654373.novalocal systemd-udevd[100827]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:33:06 np0005654373.novalocal NetworkManager[871]: [1774117986.9148] device (tap1bddffe9-e0): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:33:06 np0005654373.novalocal NetworkManager[871]: [1774117986.9154] device (tap1bddffe9-e0): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:33:06 np0005654373.novalocal NetworkManager[871]: [1774117986.9199] manager: (tapc96d665b-80): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Mar 21 14:33:06 np0005654373.novalocal systemd-udevd[100833]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:33:06 np0005654373.novalocal NetworkManager[871]: [1774117986.9545] device (tapc96d665b-80): carrier: link connected Mar 21 14:33:07 np0005654373.novalocal kernel: tapc96d665b-80: entered promiscuous mode Mar 21 14:33:07 np0005654373.novalocal sudo[100870]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-c96d665b-87bd-4875-827b-525cb2748422 env PROCESS_TAG=haproxy-c96d665b-87bd-4875-827b-525cb2748422 haproxy -f /var/lib/neutron/ovn-metadata-proxy/c96d665b-87bd-4875-827b-525cb2748422.conf Mar 21 14:33:07 np0005654373.novalocal systemd[1]: Started Session c146 of User root. Mar 21 14:33:07 np0005654373.novalocal sudo[100870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:33:07 np0005654373.novalocal sudo[100870]: pam_unix(sudo:session): session closed for user root Mar 21 14:33:12 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46554 [21/Mar/2026:14:33:12.738] listener listener/metadata 0/0/0/152/152 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:33:12 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46558 [21/Mar/2026:14:33:12.968] listener listener/metadata 0/0/0/11/11 200 115 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46570 [21/Mar/2026:14:33:13.009] listener listener/metadata 0/0/0/11/11 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46576 [21/Mar/2026:14:33:13.059] listener listener/metadata 0/0/0/11/11 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46586 [21/Mar/2026:14:33:13.106] listener listener/metadata 0/0/0/11/11 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46594 [21/Mar/2026:14:33:13.154] listener listener/metadata 0/0/0/13/13 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46596 [21/Mar/2026:14:33:13.212] listener listener/metadata 0/0/0/10/10 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46606 [21/Mar/2026:14:33:13.305] listener listener/metadata 0/0/0/14/14 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46620 [21/Mar/2026:14:33:13.383] listener listener/metadata 0/0/0/13/13 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46628 [21/Mar/2026:14:33:13.441] listener listener/metadata 0/0/0/11/11 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46632 [21/Mar/2026:14:33:13.489] listener listener/metadata 0/0/0/15/15 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46648 [21/Mar/2026:14:33:13.541] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46654 [21/Mar/2026:14:33:13.582] listener listener/metadata 0/0/0/13/13 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46666 [21/Mar/2026:14:33:13.623] listener listener/metadata 0/0/0/13/13 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46672 [21/Mar/2026:14:33:13.677] listener listener/metadata 0/0/0/17/17 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Mar 21 14:33:13 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[100737]: 10.100.0.5:46674 [21/Mar/2026:14:33:13.732] listener listener/metadata 0/0/0/8/8 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Mar 21 14:33:19 np0005654373.novalocal kernel: tap1bddffe9-e0 (unregistering): left promiscuous mode Mar 21 14:33:19 np0005654373.novalocal NetworkManager[871]: [1774117999.5679] device (tap1bddffe9-e0): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:33:19 np0005654373.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Mar 21 14:33:19 np0005654373.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 11.383s CPU time. Mar 21 14:33:19 np0005654373.novalocal systemd-machined[93279]: Machine qemu-5-instance-00000005 terminated. Mar 21 14:33:19 np0005654373.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Mar 21 14:33:19 np0005654373.novalocal kernel: tapc96d665b-80: left promiscuous mode Mar 21 14:33:19 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2dc96d665b\x2d87bd\x2d4875\x2d827b\x2d525cb2748422.mount: Deactivated successfully. Mar 21 14:33:19 np0005654373.novalocal kernel: tap1bddffe9-e0: entered promiscuous mode Mar 21 14:33:19 np0005654373.novalocal kernel: tap1bddffe9-e0 (unregistering): left promiscuous mode Mar 21 14:33:23 np0005654373.novalocal kernel: tap205a08b1-fd (unregistering): left promiscuous mode Mar 21 14:33:23 np0005654373.novalocal NetworkManager[871]: [1774118003.0356] device (tap205a08b1-fd): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:33:23 np0005654373.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Mar 21 14:33:23 np0005654373.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 17.176s CPU time. Mar 21 14:33:23 np0005654373.novalocal systemd-machined[93279]: Machine qemu-4-instance-00000004 terminated. Mar 21 14:33:23 np0005654373.novalocal kernel: tapa72b6e57-90: left promiscuous mode Mar 21 14:33:23 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2da72b6e57\x2d9ec8\x2d4dd1\x2d811d\x2d3ae519cc9739.mount: Deactivated successfully. Mar 21 14:33:23 np0005654373.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Mar 21 14:33:26 np0005654373.novalocal kernel: tap205a08b1-fd: entered promiscuous mode Mar 21 14:33:26 np0005654373.novalocal NetworkManager[871]: [1774118006.2795] manager: (tap205a08b1-fd): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Mar 21 14:33:26 np0005654373.novalocal virtqemud[96706]: Domain id=6 name='instance-00000004' uuid=f4cd7cf2-9fc1-4777-920d-8043ae3f8e00 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:33:26 np0005654373.novalocal virtqemud[96706]: Domain id=6 name='instance-00000004' uuid=f4cd7cf2-9fc1-4777-920d-8043ae3f8e00 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:33:26 np0005654373.novalocal systemd-machined[93279]: New machine qemu-6-instance-00000004. Mar 21 14:33:26 np0005654373.novalocal systemd-udevd[101040]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:33:26 np0005654373.novalocal NetworkManager[871]: [1774118006.3384] device (tap205a08b1-fd): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:33:26 np0005654373.novalocal NetworkManager[871]: [1774118006.3394] device (tap205a08b1-fd): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:33:26 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000004. Mar 21 14:33:26 np0005654373.novalocal NetworkManager[871]: [1774118006.3692] manager: (tapa72b6e57-90): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Mar 21 14:33:26 np0005654373.novalocal systemd-udevd[101043]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:33:26 np0005654373.novalocal NetworkManager[871]: [1774118006.4112] device (tapa72b6e57-90): carrier: link connected Mar 21 14:33:26 np0005654373.novalocal kernel: tapa72b6e57-90: entered promiscuous mode Mar 21 14:33:26 np0005654373.novalocal sudo[101085]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-a72b6e57-9ec8-4dd1-811d-3ae519cc9739 env PROCESS_TAG=haproxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739 haproxy -f /var/lib/neutron/ovn-metadata-proxy/a72b6e57-9ec8-4dd1-811d-3ae519cc9739.conf Mar 21 14:33:26 np0005654373.novalocal systemd[1]: Started Session c147 of User root. Mar 21 14:33:26 np0005654373.novalocal sudo[101085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:33:26 np0005654373.novalocal sudo[101085]: pam_unix(sudo:session): session closed for user root Mar 21 14:33:42 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39188 [21/Mar/2026:14:33:42.841] listener listener/metadata 0/0/0/120/120 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39198 [21/Mar/2026:14:33:43.048] listener listener/metadata 0/0/0/17/17 200 115 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39202 [21/Mar/2026:14:33:43.094] listener listener/metadata 0/0/0/12/12 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39214 [21/Mar/2026:14:33:43.143] listener listener/metadata 0/0/0/13/13 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39220 [21/Mar/2026:14:33:43.199] listener listener/metadata 0/0/0/15/15 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39236 [21/Mar/2026:14:33:43.257] listener listener/metadata 0/0/0/12/12 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39250 [21/Mar/2026:14:33:43.344] listener listener/metadata 0/0/0/16/16 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39254 [21/Mar/2026:14:33:43.412] listener listener/metadata 0/0/0/13/13 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39266 [21/Mar/2026:14:33:43.465] listener listener/metadata 0/0/0/14/14 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39278 [21/Mar/2026:14:33:43.517] listener listener/metadata 0/0/0/14/14 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39294 [21/Mar/2026:14:33:43.569] listener listener/metadata 0/0/0/13/13 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39304 [21/Mar/2026:14:33:43.618] listener listener/metadata 0/0/0/17/17 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39310 [21/Mar/2026:14:33:43.684] listener listener/metadata 0/0/0/14/14 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39316 [21/Mar/2026:14:33:43.741] listener listener/metadata 0/0/0/14/14 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39330 [21/Mar/2026:14:33:43.795] listener listener/metadata 0/0/0/13/13 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Mar 21 14:33:43 np0005654373.novalocal haproxy-metadata-proxy-a72b6e57-9ec8-4dd1-811d-3ae519cc9739[101092]: 10.100.0.5:39334 [21/Mar/2026:14:33:43.848] listener listener/metadata 0/0/0/14/14 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Mar 21 14:33:45 np0005654373.novalocal sshd-session[101175]: Connection reset by authenticating user root 91.224.92.22 port 25248 [preauth] Mar 21 14:33:48 np0005654373.novalocal kernel: tap205a08b1-fd (unregistering): left promiscuous mode Mar 21 14:33:48 np0005654373.novalocal NetworkManager[871]: [1774118028.5672] device (tap205a08b1-fd): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:33:48 np0005654373.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Deactivated successfully. Mar 21 14:33:48 np0005654373.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Consumed 14.721s CPU time. Mar 21 14:33:48 np0005654373.novalocal systemd-machined[93279]: Machine qemu-6-instance-00000004 terminated. Mar 21 14:33:48 np0005654373.novalocal kernel: tapa72b6e57-90: left promiscuous mode Mar 21 14:33:48 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2da72b6e57\x2d9ec8\x2d4dd1\x2d811d\x2d3ae519cc9739.mount: Deactivated successfully. Mar 21 14:33:48 np0005654373.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Mar 21 14:33:51 np0005654373.novalocal kernel: tap437d087f-26: entered promiscuous mode Mar 21 14:33:51 np0005654373.novalocal NetworkManager[871]: [1774118031.6513] manager: (tap437d087f-26): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Mar 21 14:33:51 np0005654373.novalocal virtqemud[96706]: Domain id=7 name='instance-00000006' uuid=8497ae0b-96ba-4ccd-b88b-7640552715e6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:33:51 np0005654373.novalocal virtqemud[96706]: Domain id=7 name='instance-00000006' uuid=8497ae0b-96ba-4ccd-b88b-7640552715e6 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:33:51 np0005654373.novalocal systemd-machined[93279]: New machine qemu-7-instance-00000006. Mar 21 14:33:51 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Mar 21 14:33:51 np0005654373.novalocal systemd-udevd[101254]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:33:51 np0005654373.novalocal NetworkManager[871]: [1774118031.7380] device (tap437d087f-26): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:33:51 np0005654373.novalocal NetworkManager[871]: [1774118031.7386] device (tap437d087f-26): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:33:51 np0005654373.novalocal NetworkManager[871]: [1774118031.7619] manager: (tap1b9b492f-40): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Mar 21 14:33:51 np0005654373.novalocal NetworkManager[871]: [1774118031.7935] device (tap1b9b492f-40): carrier: link connected Mar 21 14:33:51 np0005654373.novalocal kernel: tap1b9b492f-40: entered promiscuous mode Mar 21 14:33:51 np0005654373.novalocal sudo[101298]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-1b9b492f-4e13-4c53-ba33-ea59cdb82cf4 env PROCESS_TAG=haproxy-1b9b492f-4e13-4c53-ba33-ea59cdb82cf4 haproxy -f /var/lib/neutron/ovn-metadata-proxy/1b9b492f-4e13-4c53-ba33-ea59cdb82cf4.conf Mar 21 14:33:51 np0005654373.novalocal systemd[1]: Started Session c148 of User root. Mar 21 14:33:51 np0005654373.novalocal sudo[101298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:33:52 np0005654373.novalocal sudo[101298]: pam_unix(sudo:session): session closed for user root Mar 21 14:33:58 np0005654373.novalocal sudo[101322]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:33:58 np0005654373.novalocal systemd[1]: Started Session c149 of User root. Mar 21 14:33:58 np0005654373.novalocal sudo[101322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:33:58 np0005654373.novalocal sudo[101322]: pam_unix(sudo:session): session closed for user root Mar 21 14:33:58 np0005654373.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Mar 21 14:33:58 np0005654373.novalocal sudo[101326]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:33:58 np0005654373.novalocal systemd[1]: Started Session c150 of User root. Mar 21 14:33:58 np0005654373.novalocal sudo[101326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:33:59 np0005654373.novalocal sudo[101326]: pam_unix(sudo:session): session closed for user root Mar 21 14:33:59 np0005654373.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Mar 21 14:33:59 np0005654373.novalocal sudo[101330]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:33:59 np0005654373.novalocal systemd[1]: Started Session c151 of User root. Mar 21 14:33:59 np0005654373.novalocal sudo[101330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:33:59 np0005654373.novalocal sudo[101330]: pam_unix(sudo:session): session closed for user root Mar 21 14:33:59 np0005654373.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Mar 21 14:33:59 np0005654373.novalocal sudo[101335]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:33:59 np0005654373.novalocal systemd[1]: Started Session c152 of User root. Mar 21 14:33:59 np0005654373.novalocal sudo[101335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:00 np0005654373.novalocal sudo[101335]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:00 np0005654373.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Mar 21 14:34:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:34:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:34:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:34:04 np0005654373.novalocal kernel: tap437d087f-26 (unregistering): left promiscuous mode Mar 21 14:34:04 np0005654373.novalocal NetworkManager[871]: [1774118044.2755] device (tap437d087f-26): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:34:04 np0005654373.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Mar 21 14:34:04 np0005654373.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 11.255s CPU time. Mar 21 14:34:04 np0005654373.novalocal systemd-machined[93279]: Machine qemu-7-instance-00000006 terminated. Mar 21 14:34:04 np0005654373.novalocal kernel: tap1b9b492f-40: left promiscuous mode Mar 21 14:34:04 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2d1b9b492f\x2d4e13\x2d4c53\x2dba33\x2dea59cdb82cf4.mount: Deactivated successfully. Mar 21 14:34:04 np0005654373.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Mar 21 14:34:20 np0005654373.novalocal kernel: tap2cc254a0-eb: entered promiscuous mode Mar 21 14:34:20 np0005654373.novalocal NetworkManager[871]: [1774118060.8307] manager: (tap2cc254a0-eb): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Mar 21 14:34:20 np0005654373.novalocal virtqemud[96706]: Domain id=8 name='instance-00000007' uuid=fe8c4860-9241-4d3a-8b95-2278e2ec9e5a is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:34:20 np0005654373.novalocal virtqemud[96706]: Domain id=8 name='instance-00000007' uuid=fe8c4860-9241-4d3a-8b95-2278e2ec9e5a is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:34:20 np0005654373.novalocal systemd-machined[93279]: New machine qemu-8-instance-00000007. Mar 21 14:34:20 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Mar 21 14:34:20 np0005654373.novalocal NetworkManager[871]: [1774118060.9248] manager: (tap74d40268-60): new Veth device (/org/freedesktop/NetworkManager/Devices/24) Mar 21 14:34:20 np0005654373.novalocal systemd-udevd[101451]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:34:20 np0005654373.novalocal systemd-udevd[101453]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:34:20 np0005654373.novalocal NetworkManager[871]: [1774118060.9446] device (tap2cc254a0-eb): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:34:20 np0005654373.novalocal NetworkManager[871]: [1774118060.9455] device (tap2cc254a0-eb): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:34:20 np0005654373.novalocal NetworkManager[871]: [1774118060.9777] device (tap74d40268-60): carrier: link connected Mar 21 14:34:21 np0005654373.novalocal kernel: tap74d40268-60: entered promiscuous mode Mar 21 14:34:21 np0005654373.novalocal sudo[101492]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-74d40268-618a-4d53-a699-39f382247e63 env PROCESS_TAG=haproxy-74d40268-618a-4d53-a699-39f382247e63 haproxy -f /var/lib/neutron/ovn-metadata-proxy/74d40268-618a-4d53-a699-39f382247e63.conf Mar 21 14:34:21 np0005654373.novalocal systemd[1]: Started Session c153 of User root. Mar 21 14:34:21 np0005654373.novalocal sudo[101492]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:34:21 np0005654373.novalocal sudo[101492]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:32 np0005654373.novalocal kernel: tap2cc254a0-eb (unregistering): left promiscuous mode Mar 21 14:34:32 np0005654373.novalocal NetworkManager[871]: [1774118072.1507] device (tap2cc254a0-eb): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:34:32 np0005654373.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Mar 21 14:34:32 np0005654373.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 10.990s CPU time. Mar 21 14:34:32 np0005654373.novalocal systemd-machined[93279]: Machine qemu-8-instance-00000007 terminated. Mar 21 14:34:32 np0005654373.novalocal kernel: tap74d40268-60: left promiscuous mode Mar 21 14:34:32 np0005654373.novalocal systemd[1]: run-netns-ovnmeta\x2d74d40268\x2d618a\x2d4d53\x2da699\x2d39f382247e63.mount: Deactivated successfully. Mar 21 14:34:32 np0005654373.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Mar 21 14:34:48 np0005654373.novalocal sudo[101611]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 cinder-volumes/cinder-volumes-pool Mar 21 14:34:48 np0005654373.novalocal systemd[1]: Started Session c154 of User root. Mar 21 14:34:48 np0005654373.novalocal sudo[101611]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:49 np0005654373.novalocal sudo[101611]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:49 np0005654373.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Mar 21 14:34:50 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:34:50 np0005654373.novalocal sudo[101632]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 Mar 21 14:34:50 np0005654373.novalocal systemd[1]: Started Session c155 of User root. Mar 21 14:34:50 np0005654373.novalocal sudo[101632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:50 np0005654373.novalocal sudo[101632]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:50 np0005654373.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Mar 21 14:34:50 np0005654373.novalocal sudo[101636]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 sazp5XJj48vPtUV8yW7J bLiFUVQVEKJQN5T6 False -p3260 -a::1 Mar 21 14:34:50 np0005654373.novalocal systemd[1]: Started Session c156 of User root. Mar 21 14:34:50 np0005654373.novalocal sudo[101636]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:50 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:34:51 np0005654373.novalocal sudo[101636]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:51 np0005654373.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Mar 21 14:34:51 np0005654373.novalocal sudo[101649]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:34:51 np0005654373.novalocal systemd[1]: Started Session c157 of User root. Mar 21 14:34:51 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Mar 21 14:34:51 np0005654373.novalocal sudo[101649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:51 np0005654373.novalocal sudo[101649]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:51 np0005654373.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Mar 21 14:34:51 np0005654373.novalocal sudo[101662]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:34:51 np0005654373.novalocal systemd[1]: Started Session c158 of User root. Mar 21 14:34:51 np0005654373.novalocal sudo[101662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:52 np0005654373.novalocal sudo[101662]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:52 np0005654373.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Mar 21 14:34:52 np0005654373.novalocal sudo[101667]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 sazp5XJj48vPtUV8yW7J bLiFUVQVEKJQN5T6 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:34:52 np0005654373.novalocal systemd[1]: Started Session c159 of User root. Mar 21 14:34:52 np0005654373.novalocal sudo[101667]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 59cbbd66-efe6-486d-9471-f8551041b0cd Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 624550ac-d988-412f-9e5c-571f6a4bf351 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: failed to retrieve rpm info for path '/dev/vda1': Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 03b324a6-3cd0-4254-ada8-f4777b94d088 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 1faace30-f34b-45e2-95e5-993d4ddb6e88 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l ad9b0871-1d90-4206-b9be-6b36320aa224 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 468dc2fe-cb46-470c-af8b-1e171c206134 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 432e2b51-7f7d-47f2-bf84-751d74aeda92 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l d9c92759-405a-4908-8954-c3db26c39913 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-6Zu4n7. For complete SELinux messages run: sealert -l cc8e7535-aba7-4280-8ea0-012c668b5f3c Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-6Zu4n7. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-6Zu4n7 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 282811e6-aea8-45c9-afab-8e85810d3294 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal sudo[101667]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:52 np0005654373.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l d80d283e-6488-440f-bde2-d6c80fdfaf94 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 2086b009-b7bf-4052-bda2-d51ab447fbd7 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal sudo[101677]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 385f6fca-f3ab-4d7a-ad33-db55dce08574 Mar 21 14:34:52 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:52 np0005654373.novalocal systemd[1]: Started Session c160 of User root. Mar 21 14:34:52 np0005654373.novalocal sudo[101677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:53 np0005654373.novalocal sudo[101677]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:53 np0005654373.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Mar 21 14:34:53 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:34:53 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:34:54 np0005654373.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Mar 21 14:34:54 np0005654373.novalocal iscsid[75625]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77, portal: ::1,3260] through [iface: default] is operational now Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:34:54 np0005654373.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 21 14:34:54 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Mar 21 14:34:54 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405a04b58214f164efcbd82793fd port group 0 rel port 1 Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 21 14:34:54 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 21 14:34:54 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:34:54 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 335350d8-0954-426f-8314-2e6a4a50804f Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 888481b2-3da4-431d-b609-22bf2b428f34 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l d3b85409-791f-4fd0-a522-398423a415da Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b1fcb22a-5b70-4ce1-ba88-162477c931d7 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 419408de-89cf-420f-8034-4e71b9bd4a28 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 59824d56-cb80-4830-a3dc-b7c946d0226d Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 7261cfa3-40ba-4d1d-97e4-7488f2a72317 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 39837b07-7e04-418e-984b-8dc178261948 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l 32138503-3926-46b2-93b9-0b9942ee6371 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:34:54 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:55 np0005654373.novalocal sudo[101736]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Mar 21 14:34:55 np0005654373.novalocal systemd[1]: Started Session c161 of User root. Mar 21 14:34:55 np0005654373.novalocal sudo[101736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 1368c8c1-88e8-4dfe-9bc2-47f345dea33b Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l bff3664b-8ef6-4861-aa98-d1153de6da90 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: failed to retrieve rpm info for path '/dev/sda': Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 203d86af-05db-4a7d-870c-c9ada9dc4e28 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:34:55 np0005654373.novalocal sudo[101736]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:55 np0005654373.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Mar 21 14:34:55 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:34:55 np0005654373.novalocal sudo[101747]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:34:55 np0005654373.novalocal systemd[1]: Started Session c162 of User root. Mar 21 14:34:55 np0005654373.novalocal sudo[101747]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 50b2af88-e8c2-4661-a5e2-60e8f84c2ebb Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l c6a777ef-0b40-4657-a618-d9f0ba4a8ae0 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l c6cb1e94-ee9c-4733-9bd5-e1df880b2f71 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l a6aeaf8b-de10-4309-b049-a22bd3e613bd Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 03b324a6-3cd0-4254-ada8-f4777b94d088 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 1faace30-f34b-45e2-95e5-993d4ddb6e88 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:55 np0005654373.novalocal sudo[101747]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:55 np0005654373.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:55 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:34:55 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: Detached Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:55 np0005654373.novalocal iscsid[75625]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77, portal: ::1,3260] through [iface: default] is shutdown. Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:55 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l 4649b4cc-a021-4e68-b08a-2b363f7e6e76 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal sudo[101796]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:34:56 np0005654373.novalocal systemd[1]: Started Session c163 of User root. Mar 21 14:34:56 np0005654373.novalocal sudo[101796]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 604cd4ff-484e-4c1d-b075-d9540377b9f6 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l d6c6ac87-fa89-4f2a-9876-c94c29cbea6e Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 08fb82fa-8e03-4a98-acd1-9871f66486d9 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77. For complete SELinux messages run: sealert -l 6859792b-6812-490c-af19-f78008d58dd5 Mar 21 14:34:56 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:34:56 np0005654373.novalocal sudo[101796]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:56 np0005654373.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Mar 21 14:34:56 np0005654373.novalocal sudo[101803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:34:56 np0005654373.novalocal systemd[1]: Started Session c164 of User root. Mar 21 14:34:56 np0005654373.novalocal sudo[101803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:57 np0005654373.novalocal sudo[101803]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:57 np0005654373.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Mar 21 14:34:57 np0005654373.novalocal sudo[101808]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:34:57 np0005654373.novalocal systemd[1]: Started Session c165 of User root. Mar 21 14:34:57 np0005654373.novalocal sudo[101808]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:57 np0005654373.novalocal sudo[101808]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:57 np0005654373.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Mar 21 14:34:57 np0005654373.novalocal sudo[101813]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 Mar 21 14:34:57 np0005654373.novalocal systemd[1]: Started Session c166 of User root. Mar 21 14:34:57 np0005654373.novalocal sudo[101813]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:58 np0005654373.novalocal sudo[101813]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:58 np0005654373.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Mar 21 14:34:58 np0005654373.novalocal sudo[101820]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:34:58 np0005654373.novalocal systemd[1]: Started Session c167 of User root. Mar 21 14:34:58 np0005654373.novalocal sudo[101820]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:58 np0005654373.novalocal sudo[101825]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:34:58 np0005654373.novalocal systemd[1]: Started Session c168 of User root. Mar 21 14:34:58 np0005654373.novalocal sudo[101825]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:58 np0005654373.novalocal sudo[101820]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:58 np0005654373.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Mar 21 14:34:58 np0005654373.novalocal sudo[101825]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:58 np0005654373.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Mar 21 14:34:58 np0005654373.novalocal sudo[101829]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:34:58 np0005654373.novalocal systemd[1]: Started Session c169 of User root. Mar 21 14:34:58 np0005654373.novalocal sudo[101829]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:59 np0005654373.novalocal sudo[101829]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:59 np0005654373.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Mar 21 14:34:59 np0005654373.novalocal sudo[101834]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:34:59 np0005654373.novalocal systemd[1]: Started Session c170 of User root. Mar 21 14:34:59 np0005654373.novalocal sudo[101834]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 59cbbd66-efe6-486d-9471-f8551041b0cd Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 624550ac-d988-412f-9e5c-571f6a4bf351 Mar 21 14:34:59 np0005654373.novalocal sudo[101834]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:59 np0005654373.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Mar 21 14:34:59 np0005654373.novalocal sudo[101850]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 Mar 21 14:34:59 np0005654373.novalocal systemd[1]: Started Session c171 of User root. Mar 21 14:34:59 np0005654373.novalocal sudo[101854]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:34:59 np0005654373.novalocal sudo[101850]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:59 np0005654373.novalocal systemd[1]: Started Session c172 of User root. Mar 21 14:34:59 np0005654373.novalocal sudo[101854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 03b324a6-3cd0-4254-ada8-f4777b94d088 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 1faace30-f34b-45e2-95e5-993d4ddb6e88 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l ad9b0871-1d90-4206-b9be-6b36320aa224 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 468dc2fe-cb46-470c-af8b-1e171c206134 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 432e2b51-7f7d-47f2-bf84-751d74aeda92 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l d9c92759-405a-4908-8954-c3db26c39913 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-6SHzcl. For complete SELinux messages run: sealert -l cc8e7535-aba7-4280-8ea0-012c668b5f3c Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-6SHzcl. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-6SHzcl file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 282811e6-aea8-45c9-afab-8e85810d3294 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l d80d283e-6488-440f-bde2-d6c80fdfaf94 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 2086b009-b7bf-4052-bda2-d51ab447fbd7 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 385f6fca-f3ab-4d7a-ad33-db55dce08574 Mar 21 14:34:59 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:34:59 np0005654373.novalocal sudo[101850]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:59 np0005654373.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Mar 21 14:34:59 np0005654373.novalocal sudo[101854]: pam_unix(sudo:session): session closed for user root Mar 21 14:34:59 np0005654373.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Mar 21 14:34:59 np0005654373.novalocal sudo[101860]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 sazp5XJj48vPtUV8yW7J bLiFUVQVEKJQN5T6 False -p3260 -a::1 Mar 21 14:35:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:35:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:35:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:35:00 np0005654373.novalocal systemd[1]: Started Session c173 of User root. Mar 21 14:35:00 np0005654373.novalocal sudo[101860]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:02 np0005654373.novalocal sudo[101860]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:02 np0005654373.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Mar 21 14:35:02 np0005654373.novalocal systemd[1]: session-c173.scope: Consumed 2.644s CPU time. Mar 21 14:35:02 np0005654373.novalocal sudo[101869]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:35:02 np0005654373.novalocal systemd[1]: Started Session c174 of User root. Mar 21 14:35:02 np0005654373.novalocal sudo[101869]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:03 np0005654373.novalocal sudo[101869]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:03 np0005654373.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Mar 21 14:35:03 np0005654373.novalocal sudo[101874]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:35:03 np0005654373.novalocal systemd[1]: Started Session c175 of User root. Mar 21 14:35:03 np0005654373.novalocal sudo[101874]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:03 np0005654373.novalocal sudo[101874]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:03 np0005654373.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Mar 21 14:35:03 np0005654373.novalocal sudo[101879]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 sazp5XJj48vPtUV8yW7J bLiFUVQVEKJQN5T6 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:35:03 np0005654373.novalocal systemd[1]: Started Session c176 of User root. Mar 21 14:35:03 np0005654373.novalocal sudo[101879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:04 np0005654373.novalocal sudo[101879]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:04 np0005654373.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Mar 21 14:35:04 np0005654373.novalocal sudo[101884]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:35:04 np0005654373.novalocal systemd[1]: Started Session c177 of User root. Mar 21 14:35:04 np0005654373.novalocal sudo[101884]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:04 np0005654373.novalocal sudo[101884]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:04 np0005654373.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:35:05 np0005654373.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Mar 21 14:35:05 np0005654373.novalocal iscsid[75625]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77, portal: ::1,3260] through [iface: default] is operational now Mar 21 14:35:05 np0005654373.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Mar 21 14:35:05 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Mar 21 14:35:05 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140565ffd1d879fa49d79fd684810 port group 0 rel port 1 Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Mar 21 14:35:05 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Mar 21 14:35:05 np0005654373.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Mar 21 14:35:05 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 335350d8-0954-426f-8314-2e6a4a50804f Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 888481b2-3da4-431d-b609-22bf2b428f34 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b1fcb22a-5b70-4ce1-ba88-162477c931d7 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 39837b07-7e04-418e-984b-8dc178261948 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l 32138503-3926-46b2-93b9-0b9942ee6371 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l d3b85409-791f-4fd0-a522-398423a415da Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 335350d8-0954-426f-8314-2e6a4a50804f Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 888481b2-3da4-431d-b609-22bf2b428f34 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b1fcb22a-5b70-4ce1-ba88-162477c931d7 Mar 21 14:35:05 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:06 np0005654373.novalocal sudo[101938]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Mar 21 14:35:06 np0005654373.novalocal systemd[1]: Started Session c178 of User root. Mar 21 14:35:06 np0005654373.novalocal sudo[101938]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 1368c8c1-88e8-4dfe-9bc2-47f345dea33b Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l bff3664b-8ef6-4861-aa98-d1153de6da90 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8aecf26c-dc5f-4053-8fd1-2add10d071ae Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 203d86af-05db-4a7d-870c-c9ada9dc4e28 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ef546e24-ff1f-4894-a4b4-3450d31cd70a Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 73379557-6f53-4a19-81f7-790f33c95347 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c348db57-1aae-4e30-b0ac-5abb3a7d2cd8 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 50b2af88-e8c2-4661-a5e2-60e8f84c2ebb Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l c6a777ef-0b40-4657-a618-d9f0ba4a8ae0 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l c6cb1e94-ee9c-4733-9bd5-e1df880b2f71 Mar 21 14:35:06 np0005654373.novalocal sudo[101938]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:06 np0005654373.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Mar 21 14:35:06 np0005654373.novalocal sudo[101944]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Mar 21 14:35:06 np0005654373.novalocal systemd[1]: Started Session c179 of User root. Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Mar 21 14:35:06 np0005654373.novalocal sudo[101944]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 028049af-2f37-40c8-8ba0-fd5d3f3cd4cc Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 03b324a6-3cd0-4254-ada8-f4777b94d088 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 1faace30-f34b-45e2-95e5-993d4ddb6e88 Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Mar 21 14:35:06 np0005654373.novalocal sudo[101944]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:06 np0005654373.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Mar 21 14:35:06 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l f205f25a-e0b8-4d8a-8c20-8ed02d08514f Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l bab62034-10e8-4bc5-b8b1-7263b2e46623 Mar 21 14:35:07 np0005654373.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Mar 21 14:35:07 np0005654373.novalocal kernel: scsi 2:0:0:0: alua: Detached Mar 21 14:35:07 np0005654373.novalocal iscsid[75625]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77, portal: ::1,3260] through [iface: default] is shutdown. Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 98e454eb-b1aa-4e0a-9175-8b9b174d37c2 Mar 21 14:35:07 np0005654373.novalocal sudo[101986]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 iqn.1994-05.com.redhat:a264a278d5b7 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal systemd[1]: Started Session c180 of User root. Mar 21 14:35:07 np0005654373.novalocal sudo[101986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 9c5cd526-dc0e-4c7c-a944-9d50923ae953 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l e286c581-d730-425d-a129-7f075497d683 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 17458d43-fa3e-4ef1-b8be-0d946965bcb0 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. For complete SELinux messages run: sealert -l 4649b4cc-a021-4e68-b08a-2b363f7e6e76 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 3bdc228a-1443-412c-8f4e-6330278cfcd3 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l b19de2cd-84c5-47e7-82e9-ce8e17b8ede4 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e61bcda7-ea43-4564-a113-ed3d9db1e0fd Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 12b789b6-cab7-4ed1-8edd-659b407d6a72 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l a6841038-78da-4e9b-b7b6-c932821c8212 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 604cd4ff-484e-4c1d-b075-d9540377b9f6 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77. For complete SELinux messages run: sealert -l 419408de-89cf-420f-8034-4e71b9bd4a28 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l d6c6ac87-fa89-4f2a-9876-c94c29cbea6e Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 08fb82fa-8e03-4a98-acd1-9871f66486d9 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77. For complete SELinux messages run: sealert -l 6859792b-6812-490c-af19-f78008d58dd5 Mar 21 14:35:07 np0005654373.novalocal setroubleshoot[101629]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Mar 21 14:35:07 np0005654373.novalocal sudo[101986]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:07 np0005654373.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Mar 21 14:35:07 np0005654373.novalocal sudo[101993]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:35:07 np0005654373.novalocal systemd[1]: Started Session c181 of User root. Mar 21 14:35:07 np0005654373.novalocal sudo[101993]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:08 np0005654373.novalocal sudo[101993]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:08 np0005654373.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Mar 21 14:35:08 np0005654373.novalocal sudo[102000]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:35:08 np0005654373.novalocal systemd[1]: Started Session c182 of User root. Mar 21 14:35:08 np0005654373.novalocal sudo[102000]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:08 np0005654373.novalocal sudo[102000]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:08 np0005654373.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Mar 21 14:35:08 np0005654373.novalocal sudo[102005]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 Mar 21 14:35:08 np0005654373.novalocal systemd[1]: Started Session c183 of User root. Mar 21 14:35:08 np0005654373.novalocal sudo[102005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:09 np0005654373.novalocal sudo[102005]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:09 np0005654373.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Mar 21 14:35:09 np0005654373.novalocal sudo[102011]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Mar 21 14:35:09 np0005654373.novalocal systemd[1]: Started Session c184 of User root. Mar 21 14:35:09 np0005654373.novalocal sudo[102011]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:09 np0005654373.novalocal sudo[102011]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:09 np0005654373.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Mar 21 14:35:12 np0005654373.novalocal sudo[102018]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Mar 21 14:35:12 np0005654373.novalocal systemd[1]: Started Session c185 of User root. Mar 21 14:35:12 np0005654373.novalocal sudo[102018]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:13 np0005654373.novalocal sudo[102018]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:13 np0005654373.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Mar 21 14:35:13 np0005654373.novalocal sudo[102023]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 Mar 21 14:35:13 np0005654373.novalocal systemd[1]: Started Session c186 of User root. Mar 21 14:35:13 np0005654373.novalocal sudo[102023]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:13 np0005654373.novalocal sudo[102023]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:13 np0005654373.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Mar 21 14:35:13 np0005654373.novalocal sudo[102027]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 Mar 21 14:35:13 np0005654373.novalocal systemd[1]: Started Session c187 of User root. Mar 21 14:35:13 np0005654373.novalocal sudo[102027]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:13 np0005654373.novalocal sudo[102027]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:13 np0005654373.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Mar 21 14:35:13 np0005654373.novalocal sudo[102031]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-b32ec17f-79bf-4410-9705-2d58d72a2b77 Mar 21 14:35:13 np0005654373.novalocal systemd[1]: Started Session c188 of User root. Mar 21 14:35:13 np0005654373.novalocal sudo[102031]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:14 np0005654373.novalocal sudo[102031]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:14 np0005654373.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Mar 21 14:35:14 np0005654373.novalocal sudo[102038]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:35:14 np0005654373.novalocal systemd[1]: Started Session c189 of User root. Mar 21 14:35:14 np0005654373.novalocal sudo[102038]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:14 np0005654373.novalocal sudo[102038]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:14 np0005654373.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Mar 21 14:35:14 np0005654373.novalocal sudo[102042]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:35:14 np0005654373.novalocal systemd[1]: Started Session c190 of User root. Mar 21 14:35:14 np0005654373.novalocal sudo[102042]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:15 np0005654373.novalocal sudo[102042]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:15 np0005654373.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Mar 21 14:35:15 np0005654373.novalocal sudo[102046]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:35:15 np0005654373.novalocal systemd[1]: Started Session c191 of User root. Mar 21 14:35:15 np0005654373.novalocal sudo[102046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:15 np0005654373.novalocal sudo[102046]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:15 np0005654373.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Mar 21 14:35:15 np0005654373.novalocal sudo[102050]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:35:15 np0005654373.novalocal systemd[1]: Started Session c192 of User root. Mar 21 14:35:15 np0005654373.novalocal sudo[102050]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:15 np0005654373.novalocal sudo[102050]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:15 np0005654373.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Mar 21 14:35:17 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Mar 21 14:35:17 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.249s CPU time. Mar 21 14:35:17 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:35:17 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 5.027s CPU time. Mar 21 14:35:58 np0005654373.novalocal sudo[102127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:35:58 np0005654373.novalocal systemd[1]: Started Session c193 of User root. Mar 21 14:35:58 np0005654373.novalocal sudo[102127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:58 np0005654373.novalocal sudo[102127]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:58 np0005654373.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Mar 21 14:35:58 np0005654373.novalocal sudo[102131]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:35:58 np0005654373.novalocal systemd[1]: Started Session c194 of User root. Mar 21 14:35:58 np0005654373.novalocal sudo[102131]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:59 np0005654373.novalocal sudo[102131]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:59 np0005654373.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Mar 21 14:35:59 np0005654373.novalocal sudo[102135]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:35:59 np0005654373.novalocal systemd[1]: Started Session c195 of User root. Mar 21 14:35:59 np0005654373.novalocal sudo[102135]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:35:59 np0005654373.novalocal sudo[102135]: pam_unix(sudo:session): session closed for user root Mar 21 14:35:59 np0005654373.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Mar 21 14:35:59 np0005654373.novalocal sudo[102140]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:35:59 np0005654373.novalocal systemd[1]: Started Session c196 of User root. Mar 21 14:35:59 np0005654373.novalocal sudo[102140]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:00 np0005654373.novalocal sudo[102140]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:00 np0005654373.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Mar 21 14:36:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:36:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:36:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:36:22 np0005654373.novalocal sudo[102167]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-3fb5c474-94d9-48d2-9367-48a2d3e754de cinder-volumes/cinder-volumes-pool Mar 21 14:36:22 np0005654373.novalocal systemd[1]: Started Session c197 of User root. Mar 21 14:36:22 np0005654373.novalocal sudo[102167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:22 np0005654373.novalocal sudo[102167]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:23 np0005654373.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Mar 21 14:36:24 np0005654373.novalocal sudo[102178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-3bb05e73-f147-493c-ac4e-3e1da4ff0e83 cinder-volumes/cinder-volumes-pool Mar 21 14:36:24 np0005654373.novalocal systemd[1]: Started Session c198 of User root. Mar 21 14:36:24 np0005654373.novalocal sudo[102178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:24 np0005654373.novalocal sudo[102178]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:24 np0005654373.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Mar 21 14:36:25 np0005654373.novalocal sudo[102190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-3bb05e73-f147-493c-ac4e-3e1da4ff0e83 Mar 21 14:36:25 np0005654373.novalocal systemd[1]: Started Session c199 of User root. Mar 21 14:36:25 np0005654373.novalocal sudo[102190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:25 np0005654373.novalocal sudo[102190]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:25 np0005654373.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Mar 21 14:36:25 np0005654373.novalocal sudo[102194]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-3bb05e73-f147-493c-ac4e-3e1da4ff0e83 Mar 21 14:36:25 np0005654373.novalocal systemd[1]: Started Session c200 of User root. Mar 21 14:36:25 np0005654373.novalocal sudo[102194]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:25 np0005654373.novalocal sshd-session[102188]: Connection reset by authenticating user root 2.57.122.196 port 35700 [preauth] Mar 21 14:36:25 np0005654373.novalocal sudo[102194]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:25 np0005654373.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Mar 21 14:36:25 np0005654373.novalocal sudo[102198]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-3bb05e73-f147-493c-ac4e-3e1da4ff0e83 Mar 21 14:36:25 np0005654373.novalocal systemd[1]: Started Session c201 of User root. Mar 21 14:36:26 np0005654373.novalocal sudo[102198]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:26 np0005654373.novalocal sudo[102198]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:26 np0005654373.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Mar 21 14:36:26 np0005654373.novalocal sudo[102205]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:26 np0005654373.novalocal systemd[1]: Started Session c202 of User root. Mar 21 14:36:26 np0005654373.novalocal sudo[102205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:26 np0005654373.novalocal sudo[102208]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-3fb5c474-94d9-48d2-9367-48a2d3e754de Mar 21 14:36:26 np0005654373.novalocal systemd[1]: Started Session c203 of User root. Mar 21 14:36:26 np0005654373.novalocal sudo[102208]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:26 np0005654373.novalocal sudo[102205]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:26 np0005654373.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Mar 21 14:36:26 np0005654373.novalocal sudo[102213]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:26 np0005654373.novalocal systemd[1]: Started Session c204 of User root. Mar 21 14:36:26 np0005654373.novalocal sudo[102213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:26 np0005654373.novalocal sudo[102208]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:26 np0005654373.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Mar 21 14:36:26 np0005654373.novalocal sudo[102216]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-3fb5c474-94d9-48d2-9367-48a2d3e754de Mar 21 14:36:26 np0005654373.novalocal systemd[1]: Started Session c205 of User root. Mar 21 14:36:26 np0005654373.novalocal sudo[102216]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:27 np0005654373.novalocal sudo[102213]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:27 np0005654373.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Mar 21 14:36:27 np0005654373.novalocal sudo[102221]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:27 np0005654373.novalocal systemd[1]: Started Session c206 of User root. Mar 21 14:36:27 np0005654373.novalocal sudo[102221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:27 np0005654373.novalocal sudo[102216]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:27 np0005654373.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Mar 21 14:36:27 np0005654373.novalocal sudo[102224]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-3fb5c474-94d9-48d2-9367-48a2d3e754de Mar 21 14:36:27 np0005654373.novalocal systemd[1]: Started Session c207 of User root. Mar 21 14:36:27 np0005654373.novalocal sudo[102224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:27 np0005654373.novalocal sudo[102221]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:27 np0005654373.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Mar 21 14:36:27 np0005654373.novalocal sudo[102230]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:27 np0005654373.novalocal systemd[1]: Started Session c208 of User root. Mar 21 14:36:27 np0005654373.novalocal sudo[102230]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:27 np0005654373.novalocal sudo[102224]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:27 np0005654373.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Mar 21 14:36:27 np0005654373.novalocal sudo[102233]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:27 np0005654373.novalocal systemd[1]: Started Session c209 of User root. Mar 21 14:36:27 np0005654373.novalocal sudo[102233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:27 np0005654373.novalocal sudo[102230]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:27 np0005654373.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Mar 21 14:36:27 np0005654373.novalocal sudo[102233]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:27 np0005654373.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Mar 21 14:36:27 np0005654373.novalocal sudo[102238]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:27 np0005654373.novalocal systemd[1]: Started Session c210 of User root. Mar 21 14:36:27 np0005654373.novalocal sudo[102238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:28 np0005654373.novalocal sudo[102238]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:28 np0005654373.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Mar 21 14:36:28 np0005654373.novalocal sudo[102244]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:28 np0005654373.novalocal systemd[1]: Started Session c211 of User root. Mar 21 14:36:28 np0005654373.novalocal sudo[102244]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:28 np0005654373.novalocal sudo[102244]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:28 np0005654373.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Mar 21 14:36:28 np0005654373.novalocal sudo[102248]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:28 np0005654373.novalocal systemd[1]: Started Session c212 of User root. Mar 21 14:36:28 np0005654373.novalocal sudo[102248]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:29 np0005654373.novalocal sudo[102248]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:29 np0005654373.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Mar 21 14:36:30 np0005654373.novalocal sudo[102252]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:36:30 np0005654373.novalocal systemd[1]: Started Session c213 of User root. Mar 21 14:36:30 np0005654373.novalocal sudo[102252]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:30 np0005654373.novalocal sudo[102252]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:30 np0005654373.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Mar 21 14:36:30 np0005654373.novalocal sudo[102256]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-7bdf089d-8ef3-4eb5-9d37-16f49d58ef8a --snapshot cinder-volumes/volume-7bed217d-46f2-4a51-b46b-eac6d38ac967 Mar 21 14:36:30 np0005654373.novalocal systemd[1]: Started Session c214 of User root. Mar 21 14:36:30 np0005654373.novalocal sudo[102256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:30 np0005654373.novalocal dmeventd[91396]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Mar 21 14:36:30 np0005654373.novalocal dmeventd[91396]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Mar 21 14:36:30 np0005654373.novalocal sudo[102256]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:30 np0005654373.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Mar 21 14:36:30 np0005654373.novalocal sudo[102266]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-7bdf089d-8ef3-4eb5-9d37-16f49d58ef8a Mar 21 14:36:30 np0005654373.novalocal systemd[1]: Started Session c215 of User root. Mar 21 14:36:30 np0005654373.novalocal sudo[102266]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:31 np0005654373.novalocal sudo[102266]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:31 np0005654373.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Mar 21 14:36:32 np0005654373.novalocal sudo[102276]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-5732fe04-fd1a-4303-9609-09e83ab9064a cinder-volumes/cinder-volumes-pool Mar 21 14:36:32 np0005654373.novalocal systemd[1]: Started Session c216 of User root. Mar 21 14:36:32 np0005654373.novalocal sudo[102276]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:32 np0005654373.novalocal sudo[102276]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:32 np0005654373.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Mar 21 14:36:33 np0005654373.novalocal sudo[102285]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-5732fe04-fd1a-4303-9609-09e83ab9064a Mar 21 14:36:33 np0005654373.novalocal systemd[1]: Started Session c217 of User root. Mar 21 14:36:33 np0005654373.novalocal sudo[102285]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:34 np0005654373.novalocal sudo[102285]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:34 np0005654373.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Mar 21 14:36:34 np0005654373.novalocal sudo[102289]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-5732fe04-fd1a-4303-9609-09e83ab9064a Mar 21 14:36:34 np0005654373.novalocal systemd[1]: Started Session c218 of User root. Mar 21 14:36:34 np0005654373.novalocal sudo[102289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:34 np0005654373.novalocal sudo[102289]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:34 np0005654373.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Mar 21 14:36:34 np0005654373.novalocal sudo[102293]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-5732fe04-fd1a-4303-9609-09e83ab9064a Mar 21 14:36:34 np0005654373.novalocal systemd[1]: Started Session c219 of User root. Mar 21 14:36:34 np0005654373.novalocal sudo[102293]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:34 np0005654373.novalocal sudo[102293]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:34 np0005654373.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Mar 21 14:36:34 np0005654373.novalocal sudo[102300]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:35 np0005654373.novalocal systemd[1]: Started Session c220 of User root. Mar 21 14:36:35 np0005654373.novalocal sudo[102300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:35 np0005654373.novalocal sudo[102300]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:35 np0005654373.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Mar 21 14:36:35 np0005654373.novalocal sudo[102304]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:35 np0005654373.novalocal systemd[1]: Started Session c221 of User root. Mar 21 14:36:35 np0005654373.novalocal sudo[102304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:35 np0005654373.novalocal sudo[102304]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:35 np0005654373.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Mar 21 14:36:35 np0005654373.novalocal sudo[102308]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:35 np0005654373.novalocal systemd[1]: Started Session c222 of User root. Mar 21 14:36:35 np0005654373.novalocal sudo[102308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:36 np0005654373.novalocal sudo[102311]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-7bdf089d-8ef3-4eb5-9d37-16f49d58ef8a Mar 21 14:36:36 np0005654373.novalocal systemd[1]: Started Session c223 of User root. Mar 21 14:36:36 np0005654373.novalocal sudo[102311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:36 np0005654373.novalocal sudo[102308]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:36 np0005654373.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Mar 21 14:36:36 np0005654373.novalocal sudo[102315]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:36 np0005654373.novalocal systemd[1]: Started Session c224 of User root. Mar 21 14:36:36 np0005654373.novalocal sudo[102315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:36 np0005654373.novalocal sudo[102311]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:36 np0005654373.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Mar 21 14:36:36 np0005654373.novalocal sudo[102315]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:36 np0005654373.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Mar 21 14:36:36 np0005654373.novalocal sudo[102320]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-7bdf089d-8ef3-4eb5-9d37-16f49d58ef8a Mar 21 14:36:36 np0005654373.novalocal systemd[1]: Started Session c225 of User root. Mar 21 14:36:36 np0005654373.novalocal sudo[102320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:36 np0005654373.novalocal sudo[102320]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:36 np0005654373.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Mar 21 14:36:36 np0005654373.novalocal sudo[102324]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-7bdf089d-8ef3-4eb5-9d37-16f49d58ef8a Mar 21 14:36:36 np0005654373.novalocal systemd[1]: Started Session c226 of User root. Mar 21 14:36:36 np0005654373.novalocal sudo[102324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:37 np0005654373.novalocal sudo[102324]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:37 np0005654373.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Mar 21 14:36:37 np0005654373.novalocal sudo[102330]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:37 np0005654373.novalocal systemd[1]: Started Session c227 of User root. Mar 21 14:36:37 np0005654373.novalocal sudo[102330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:37 np0005654373.novalocal sudo[102330]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:37 np0005654373.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Mar 21 14:36:37 np0005654373.novalocal sudo[102335]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:37 np0005654373.novalocal systemd[1]: Started Session c228 of User root. Mar 21 14:36:37 np0005654373.novalocal sudo[102335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:37 np0005654373.novalocal sudo[102335]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:37 np0005654373.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Mar 21 14:36:37 np0005654373.novalocal sudo[102339]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:38 np0005654373.novalocal systemd[1]: Started Session c229 of User root. Mar 21 14:36:38 np0005654373.novalocal sudo[102339]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:38 np0005654373.novalocal sudo[102339]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:38 np0005654373.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Mar 21 14:36:38 np0005654373.novalocal sudo[102345]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:38 np0005654373.novalocal systemd[1]: Started Session c230 of User root. Mar 21 14:36:38 np0005654373.novalocal sudo[102345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:38 np0005654373.novalocal sudo[102345]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:38 np0005654373.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Mar 21 14:36:42 np0005654373.novalocal sudo[102387]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-dcc02a5a-9d21-411e-9e37-106b51092a1d cinder-volumes/cinder-volumes-pool Mar 21 14:36:42 np0005654373.novalocal systemd[1]: Started Session c231 of User root. Mar 21 14:36:42 np0005654373.novalocal sudo[102387]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:42 np0005654373.novalocal sudo[102387]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:42 np0005654373.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Mar 21 14:36:43 np0005654373.novalocal sudo[102399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-b24e5110-18c3-4310-a4de-a73dc890bb09 cinder-volumes/cinder-volumes-pool Mar 21 14:36:43 np0005654373.novalocal systemd[1]: Started Session c232 of User root. Mar 21 14:36:43 np0005654373.novalocal sudo[102399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:43 np0005654373.novalocal sudo[102399]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:43 np0005654373.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Mar 21 14:36:44 np0005654373.novalocal sudo[102409]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-b576e9f8-dbe3-47a1-a249-4328745c9446 cinder-volumes/cinder-volumes-pool Mar 21 14:36:44 np0005654373.novalocal systemd[1]: Started Session c233 of User root. Mar 21 14:36:44 np0005654373.novalocal sudo[102409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:45 np0005654373.novalocal sudo[102409]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:45 np0005654373.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Mar 21 14:36:45 np0005654373.novalocal sudo[102418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-b576e9f8-dbe3-47a1-a249-4328745c9446 Mar 21 14:36:45 np0005654373.novalocal systemd[1]: Started Session c234 of User root. Mar 21 14:36:45 np0005654373.novalocal sudo[102418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:46 np0005654373.novalocal sudo[102418]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:46 np0005654373.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Mar 21 14:36:46 np0005654373.novalocal sudo[102422]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-b576e9f8-dbe3-47a1-a249-4328745c9446 Mar 21 14:36:46 np0005654373.novalocal systemd[1]: Started Session c235 of User root. Mar 21 14:36:46 np0005654373.novalocal sudo[102422]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:46 np0005654373.novalocal sudo[102422]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:46 np0005654373.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Mar 21 14:36:46 np0005654373.novalocal sudo[102427]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-b576e9f8-dbe3-47a1-a249-4328745c9446 Mar 21 14:36:46 np0005654373.novalocal systemd[1]: Started Session c236 of User root. Mar 21 14:36:46 np0005654373.novalocal sudo[102427]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:47 np0005654373.novalocal sudo[102427]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:47 np0005654373.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Mar 21 14:36:47 np0005654373.novalocal sudo[102434]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:47 np0005654373.novalocal systemd[1]: Started Session c237 of User root. Mar 21 14:36:47 np0005654373.novalocal sudo[102434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:47 np0005654373.novalocal sudo[102434]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:47 np0005654373.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Mar 21 14:36:47 np0005654373.novalocal sudo[102438]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:47 np0005654373.novalocal systemd[1]: Started Session c238 of User root. Mar 21 14:36:47 np0005654373.novalocal sudo[102438]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:47 np0005654373.novalocal sudo[102438]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:47 np0005654373.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Mar 21 14:36:47 np0005654373.novalocal sudo[102442]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:47 np0005654373.novalocal systemd[1]: Started Session c239 of User root. Mar 21 14:36:47 np0005654373.novalocal sudo[102442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:48 np0005654373.novalocal sudo[102448]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-b24e5110-18c3-4310-a4de-a73dc890bb09 Mar 21 14:36:48 np0005654373.novalocal systemd[1]: Started Session c240 of User root. Mar 21 14:36:48 np0005654373.novalocal sudo[102448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:48 np0005654373.novalocal sudo[102442]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:48 np0005654373.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Mar 21 14:36:48 np0005654373.novalocal sudo[102451]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:48 np0005654373.novalocal systemd[1]: Started Session c241 of User root. Mar 21 14:36:48 np0005654373.novalocal sudo[102451]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:48 np0005654373.novalocal sudo[102448]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:48 np0005654373.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Mar 21 14:36:48 np0005654373.novalocal sudo[102455]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-b24e5110-18c3-4310-a4de-a73dc890bb09 Mar 21 14:36:48 np0005654373.novalocal systemd[1]: Started Session c242 of User root. Mar 21 14:36:48 np0005654373.novalocal sudo[102455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:48 np0005654373.novalocal sudo[102451]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:48 np0005654373.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Mar 21 14:36:48 np0005654373.novalocal sudo[102455]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:48 np0005654373.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Mar 21 14:36:49 np0005654373.novalocal sudo[102461]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-b24e5110-18c3-4310-a4de-a73dc890bb09 Mar 21 14:36:49 np0005654373.novalocal systemd[1]: Started Session c243 of User root. Mar 21 14:36:49 np0005654373.novalocal sudo[102461]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:49 np0005654373.novalocal sudo[102461]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:49 np0005654373.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Mar 21 14:36:49 np0005654373.novalocal sudo[102466]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:49 np0005654373.novalocal systemd[1]: Started Session c244 of User root. Mar 21 14:36:49 np0005654373.novalocal sudo[102466]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:49 np0005654373.novalocal sudo[102466]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:49 np0005654373.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Mar 21 14:36:49 np0005654373.novalocal sudo[102471]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:49 np0005654373.novalocal systemd[1]: Started Session c245 of User root. Mar 21 14:36:49 np0005654373.novalocal sudo[102471]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:50 np0005654373.novalocal sudo[102471]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:50 np0005654373.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Mar 21 14:36:50 np0005654373.novalocal sudo[102475]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:50 np0005654373.novalocal systemd[1]: Started Session c246 of User root. Mar 21 14:36:50 np0005654373.novalocal sudo[102475]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:50 np0005654373.novalocal sudo[102478]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-dcc02a5a-9d21-411e-9e37-106b51092a1d Mar 21 14:36:50 np0005654373.novalocal systemd[1]: Started Session c247 of User root. Mar 21 14:36:50 np0005654373.novalocal sudo[102478]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:50 np0005654373.novalocal sudo[102475]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:50 np0005654373.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Mar 21 14:36:50 np0005654373.novalocal sudo[102482]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:50 np0005654373.novalocal systemd[1]: Started Session c248 of User root. Mar 21 14:36:50 np0005654373.novalocal sudo[102482]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:50 np0005654373.novalocal sudo[102478]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:50 np0005654373.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Mar 21 14:36:50 np0005654373.novalocal sudo[102486]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-dcc02a5a-9d21-411e-9e37-106b51092a1d Mar 21 14:36:50 np0005654373.novalocal systemd[1]: Started Session c249 of User root. Mar 21 14:36:50 np0005654373.novalocal sudo[102486]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:51 np0005654373.novalocal sudo[102482]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:51 np0005654373.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Mar 21 14:36:51 np0005654373.novalocal sudo[102486]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:51 np0005654373.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Mar 21 14:36:51 np0005654373.novalocal sudo[102491]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-dcc02a5a-9d21-411e-9e37-106b51092a1d Mar 21 14:36:51 np0005654373.novalocal systemd[1]: Started Session c250 of User root. Mar 21 14:36:51 np0005654373.novalocal sudo[102491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:52 np0005654373.novalocal sudo[102491]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:52 np0005654373.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Mar 21 14:36:52 np0005654373.novalocal sudo[102497]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:52 np0005654373.novalocal systemd[1]: Started Session c251 of User root. Mar 21 14:36:52 np0005654373.novalocal sudo[102497]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:52 np0005654373.novalocal sudo[102497]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:52 np0005654373.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Mar 21 14:36:52 np0005654373.novalocal sudo[102501]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:52 np0005654373.novalocal systemd[1]: Started Session c252 of User root. Mar 21 14:36:52 np0005654373.novalocal sudo[102501]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:52 np0005654373.novalocal sudo[102501]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:52 np0005654373.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Mar 21 14:36:52 np0005654373.novalocal sudo[102505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:52 np0005654373.novalocal systemd[1]: Started Session c253 of User root. Mar 21 14:36:52 np0005654373.novalocal sudo[102505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:53 np0005654373.novalocal sudo[102505]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:53 np0005654373.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Mar 21 14:36:53 np0005654373.novalocal sudo[102509]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:53 np0005654373.novalocal systemd[1]: Started Session c254 of User root. Mar 21 14:36:53 np0005654373.novalocal sudo[102509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:53 np0005654373.novalocal sudo[102509]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:53 np0005654373.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Mar 21 14:36:58 np0005654373.novalocal sudo[102519]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:36:58 np0005654373.novalocal systemd[1]: Started Session c255 of User root. Mar 21 14:36:58 np0005654373.novalocal sudo[102519]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:58 np0005654373.novalocal sudo[102519]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:58 np0005654373.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Mar 21 14:36:58 np0005654373.novalocal sudo[102523]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:58 np0005654373.novalocal systemd[1]: Started Session c256 of User root. Mar 21 14:36:58 np0005654373.novalocal sudo[102523]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:59 np0005654373.novalocal sudo[102523]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:59 np0005654373.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Mar 21 14:36:59 np0005654373.novalocal sudo[102527]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:36:59 np0005654373.novalocal systemd[1]: Started Session c257 of User root. Mar 21 14:36:59 np0005654373.novalocal sudo[102527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:59 np0005654373.novalocal sudo[102527]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:59 np0005654373.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Mar 21 14:36:59 np0005654373.novalocal sudo[102533]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:36:59 np0005654373.novalocal systemd[1]: Started Session c258 of User root. Mar 21 14:36:59 np0005654373.novalocal sudo[102533]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:36:59 np0005654373.novalocal sudo[102533]: pam_unix(sudo:session): session closed for user root Mar 21 14:36:59 np0005654373.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Mar 21 14:37:04 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:37:04 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:37:04 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:37:15 np0005654373.novalocal sudo[102549]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-b32a6292-5aa8-4b61-90c9-655779268345 cinder-volumes/cinder-volumes-pool Mar 21 14:37:15 np0005654373.novalocal systemd[1]: Started Session c259 of User root. Mar 21 14:37:15 np0005654373.novalocal sudo[102549]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:37:16 np0005654373.novalocal sudo[102549]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:16 np0005654373.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Mar 21 14:37:22 np0005654373.novalocal sudo[102565]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpyscfgv0j/privsep.sock Mar 21 14:37:22 np0005654373.novalocal systemd[1]: Started Session c260 of User root. Mar 21 14:37:22 np0005654373.novalocal sudo[102565]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:37:23 np0005654373.novalocal sudo[102565]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:25 np0005654373.novalocal sudo[102596]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpdqfys_lb/privsep.sock Mar 21 14:37:25 np0005654373.novalocal systemd[1]: Started Session c261 of User root. Mar 21 14:37:25 np0005654373.novalocal sudo[102596]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:37:25 np0005654373.novalocal sudo[102596]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:26 np0005654373.novalocal sudo[102611]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Mar 21 14:37:26 np0005654373.novalocal systemd[1]: Started Session c262 of User root. Mar 21 14:37:26 np0005654373.novalocal sudo[102611]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:37:27 np0005654373.novalocal kernel: vg1e2a736d-1c3: entered promiscuous mode Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.1529] manager: (vg1e2a736d-1c3): 'openvswitch' plugin not available; creating generic device Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.1544] manager: (vg1e2a736d-1c3): new Generic device (/org/freedesktop/NetworkManager/Devices/25) Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.2441] manager: (tap06463d01-20): new Veth device (/org/freedesktop/NetworkManager/Devices/26) Mar 21 14:37:27 np0005654373.novalocal systemd-udevd[102646]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.2848] device (tap06463d01-20): carrier: link connected Mar 21 14:37:27 np0005654373.novalocal kernel: tap06463d01-20: entered promiscuous mode Mar 21 14:37:27 np0005654373.novalocal sudo[102684]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-06463d01-2e39-4560-8da4-a1a229e15c32 env PROCESS_TAG=haproxy-06463d01-2e39-4560-8da4-a1a229e15c32 haproxy -f /var/lib/neutron/ovn-metadata-proxy/06463d01-2e39-4560-8da4-a1a229e15c32.conf Mar 21 14:37:27 np0005654373.novalocal systemd[1]: Started Session c263 of User root. Mar 21 14:37:27 np0005654373.novalocal sudo[102684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:37:27 np0005654373.novalocal sudo[102684]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:27 np0005654373.novalocal kernel: tap59582bdb-8b: entered promiscuous mode Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.9057] manager: (tap59582bdb-8b): new Tun device (/org/freedesktop/NetworkManager/Devices/27) Mar 21 14:37:27 np0005654373.novalocal virtqemud[96706]: Domain id=9 name='instance-00000008' uuid=6fa1734d-094b-4d05-b43a-1a1936bdf1c1 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:37:27 np0005654373.novalocal virtqemud[96706]: Domain id=9 name='instance-00000008' uuid=6fa1734d-094b-4d05-b43a-1a1936bdf1c1 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.9231] device (tap59582bdb-8b): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.9238] device (tap59582bdb-8b): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:37:27 np0005654373.novalocal systemd-machined[93279]: New machine qemu-9-instance-00000008. Mar 21 14:37:27 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Mar 21 14:37:27 np0005654373.novalocal kernel: vred5039a4-e6a: entered promiscuous mode Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.9714] manager: (vred5039a4-e6a): 'openvswitch' plugin not available; creating generic device Mar 21 14:37:27 np0005654373.novalocal NetworkManager[871]: [1774118247.9723] manager: (vred5039a4-e6a): new Generic device (/org/freedesktop/NetworkManager/Devices/28) Mar 21 14:37:28 np0005654373.novalocal NetworkManager[871]: [1774118248.0232] manager: (tap677384db-30): new Veth device (/org/freedesktop/NetworkManager/Devices/29) Mar 21 14:37:28 np0005654373.novalocal NetworkManager[871]: [1774118248.0697] device (tap677384db-30): carrier: link connected Mar 21 14:37:28 np0005654373.novalocal kernel: tap677384db-30: entered promiscuous mode Mar 21 14:37:28 np0005654373.novalocal sudo[102774]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-677384db-3ac7-47be-ad86-c22d2382f236 env PROCESS_TAG=haproxy-677384db-3ac7-47be-ad86-c22d2382f236 haproxy -f /var/lib/neutron/ovn-metadata-proxy/677384db-3ac7-47be-ad86-c22d2382f236.conf Mar 21 14:37:28 np0005654373.novalocal systemd[1]: Started Session c264 of User root. Mar 21 14:37:28 np0005654373.novalocal sudo[102774]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:37:28 np0005654373.novalocal sudo[102774]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:29 np0005654373.novalocal kernel: IPv4 over IPsec tunneling driver Mar 21 14:37:29 np0005654373.novalocal NetworkManager[871]: [1774118249.8283] manager: (ip_vti0): new IPTunnel device (/org/freedesktop/NetworkManager/Devices/30) Mar 21 14:37:29 np0005654373.novalocal kernel: IPsec XFRM device driver Mar 21 14:37:52 np0005654373.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Mar 21 14:37:52 np0005654373.novalocal kernel: tap06463d01-20: left promiscuous mode Mar 21 14:37:55 np0005654373.novalocal kernel: vred5039a4-e6a: left promiscuous mode Mar 21 14:37:55 np0005654373.novalocal kernel: vg1e2a736d-1c3: left promiscuous mode Mar 21 14:37:55 np0005654373.novalocal systemd[1]: run-netns-qvpn\x2dd7a30517\x2decd4\x2d4797\x2da654\x2d59e55d701e89.mount: Deactivated successfully. Mar 21 14:37:58 np0005654373.novalocal sudo[103298]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:37:58 np0005654373.novalocal systemd[1]: Started Session c265 of User root. Mar 21 14:37:58 np0005654373.novalocal sudo[103298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:37:58 np0005654373.novalocal sudo[103298]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:58 np0005654373.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Mar 21 14:37:58 np0005654373.novalocal sudo[103302]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:37:58 np0005654373.novalocal systemd[1]: Started Session c266 of User root. Mar 21 14:37:58 np0005654373.novalocal sudo[103302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:37:59 np0005654373.novalocal sudo[103302]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:59 np0005654373.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Mar 21 14:37:59 np0005654373.novalocal sudo[103306]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:37:59 np0005654373.novalocal systemd[1]: Started Session c267 of User root. Mar 21 14:37:59 np0005654373.novalocal sudo[103306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:37:59 np0005654373.novalocal sudo[103306]: pam_unix(sudo:session): session closed for user root Mar 21 14:37:59 np0005654373.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Mar 21 14:37:59 np0005654373.novalocal sudo[103310]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:37:59 np0005654373.novalocal systemd[1]: Started Session c268 of User root. Mar 21 14:37:59 np0005654373.novalocal sudo[103310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:00 np0005654373.novalocal sudo[103310]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:00 np0005654373.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Mar 21 14:38:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:38:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:38:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:38:00 np0005654373.novalocal kernel: tap59582bdb-8b (unregistering): left promiscuous mode Mar 21 14:38:00 np0005654373.novalocal NetworkManager[871]: [1774118280.8073] device (tap59582bdb-8b): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:38:00 np0005654373.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Mar 21 14:38:00 np0005654373.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Mar 21 14:38:00 np0005654373.novalocal kernel: tap677384db-30: left promiscuous mode Mar 21 14:38:00 np0005654373.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 11.250s CPU time. Mar 21 14:38:00 np0005654373.novalocal systemd-machined[93279]: Machine qemu-9-instance-00000008 terminated. Mar 21 14:38:10 np0005654373.novalocal sudo[103357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-b32a6292-5aa8-4b61-90c9-655779268345 Mar 21 14:38:10 np0005654373.novalocal systemd[1]: Started Session c269 of User root. Mar 21 14:38:10 np0005654373.novalocal sudo[103357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:10 np0005654373.novalocal sudo[103357]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:10 np0005654373.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Mar 21 14:38:10 np0005654373.novalocal sudo[103361]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-b32a6292-5aa8-4b61-90c9-655779268345 Mar 21 14:38:10 np0005654373.novalocal systemd[1]: Started Session c270 of User root. Mar 21 14:38:10 np0005654373.novalocal sudo[103361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:10 np0005654373.novalocal sudo[103361]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:10 np0005654373.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Mar 21 14:38:10 np0005654373.novalocal sudo[103365]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-b32a6292-5aa8-4b61-90c9-655779268345 Mar 21 14:38:10 np0005654373.novalocal systemd[1]: Started Session c271 of User root. Mar 21 14:38:10 np0005654373.novalocal sudo[103365]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:11 np0005654373.novalocal sudo[103365]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:11 np0005654373.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Mar 21 14:38:11 np0005654373.novalocal sudo[103372]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:38:11 np0005654373.novalocal systemd[1]: Started Session c272 of User root. Mar 21 14:38:11 np0005654373.novalocal sudo[103372]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:11 np0005654373.novalocal sudo[103372]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:11 np0005654373.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Mar 21 14:38:11 np0005654373.novalocal sudo[103376]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:38:11 np0005654373.novalocal systemd[1]: Started Session c273 of User root. Mar 21 14:38:11 np0005654373.novalocal sudo[103376]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:12 np0005654373.novalocal sudo[103376]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:12 np0005654373.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Mar 21 14:38:12 np0005654373.novalocal sudo[103380]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:38:12 np0005654373.novalocal systemd[1]: Started Session c274 of User root. Mar 21 14:38:12 np0005654373.novalocal sudo[103380]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:12 np0005654373.novalocal sudo[103380]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:12 np0005654373.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Mar 21 14:38:12 np0005654373.novalocal sudo[103384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:38:12 np0005654373.novalocal systemd[1]: Started Session c275 of User root. Mar 21 14:38:12 np0005654373.novalocal sudo[103384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:12 np0005654373.novalocal sudo[103384]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:12 np0005654373.novalocal systemd[1]: session-c275.scope: Deactivated successfully. Mar 21 14:38:20 np0005654373.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Mar 21 14:38:21 np0005654373.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Mar 21 14:38:22 np0005654373.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Mar 21 14:38:23 np0005654373.novalocal setroubleshoot[103399]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 1434fa4f-442d-430d-b5d2-8cbb04db9695 Mar 21 14:38:23 np0005654373.novalocal setroubleshoot[103399]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Mar 21 14:38:32 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Mar 21 14:38:32 np0005654373.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.187s CPU time. Mar 21 14:38:33 np0005654373.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Mar 21 14:38:33 np0005654373.novalocal systemd[1]: setroubleshootd.service: Consumed 1.255s CPU time. Mar 21 14:38:35 np0005654373.novalocal kernel: tapb276a2ef-b2: entered promiscuous mode Mar 21 14:38:35 np0005654373.novalocal NetworkManager[871]: [1774118315.7391] manager: (tapb276a2ef-b2): new Tun device (/org/freedesktop/NetworkManager/Devices/31) Mar 21 14:38:35 np0005654373.novalocal virtqemud[96706]: Domain id=10 name='instance-00000009' uuid=b3c992bc-dbcf-4f11-8858-16da7bd6f3eb is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:38:35 np0005654373.novalocal virtqemud[96706]: Domain id=10 name='instance-00000009' uuid=b3c992bc-dbcf-4f11-8858-16da7bd6f3eb is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:38:35 np0005654373.novalocal systemd-machined[93279]: New machine qemu-10-instance-00000009. Mar 21 14:38:35 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Mar 21 14:38:35 np0005654373.novalocal systemd-udevd[103470]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:38:35 np0005654373.novalocal NetworkManager[871]: [1774118315.8507] device (tapb276a2ef-b2): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:38:35 np0005654373.novalocal NetworkManager[871]: [1774118315.8535] device (tapb276a2ef-b2): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:38:35 np0005654373.novalocal NetworkManager[871]: [1774118315.8561] manager: (tap21585ead-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/32) Mar 21 14:38:35 np0005654373.novalocal NetworkManager[871]: [1774118315.8975] device (tap21585ead-b0): carrier: link connected Mar 21 14:38:36 np0005654373.novalocal kernel: tap21585ead-b0: entered promiscuous mode Mar 21 14:38:36 np0005654373.novalocal sudo[103514]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-21585ead-b95e-4817-aa41-385782851521 env PROCESS_TAG=haproxy-21585ead-b95e-4817-aa41-385782851521 haproxy -f /var/lib/neutron/ovn-metadata-proxy/21585ead-b95e-4817-aa41-385782851521.conf Mar 21 14:38:36 np0005654373.novalocal systemd[1]: Started Session c276 of User root. Mar 21 14:38:36 np0005654373.novalocal sudo[103514]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:38:36 np0005654373.novalocal sudo[103514]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:55 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35890 [21/Mar/2026:14:38:55.525] listener listener/metadata 0/0/0/197/197 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:38:55 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35898 [21/Mar/2026:14:38:55.835] listener listener/metadata 0/0/0/12/12 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Mar 21 14:38:55 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35908 [21/Mar/2026:14:38:55.876] listener listener/metadata 0/0/0/12/12 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Mar 21 14:38:55 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35910 [21/Mar/2026:14:38:55.927] listener listener/metadata 0/0/0/12/12 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:38:55 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35918 [21/Mar/2026:14:38:55.982] listener listener/metadata 0/0/0/12/12 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35926 [21/Mar/2026:14:38:56.066] listener listener/metadata 0/0/0/13/13 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35934 [21/Mar/2026:14:38:56.145] listener listener/metadata 0/0/0/13/13 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35948 [21/Mar/2026:14:38:56.212] listener listener/metadata 0/0/0/12/12 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35954 [21/Mar/2026:14:38:56.266] listener listener/metadata 0/0/0/12/12 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35966 [21/Mar/2026:14:38:56.324] listener listener/metadata 0/0/0/13/13 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35972 [21/Mar/2026:14:38:56.408] listener listener/metadata 0/0/0/15/15 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35980 [21/Mar/2026:14:38:56.485] listener listener/metadata 0/0/0/10/10 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:35992 [21/Mar/2026:14:38:56.523] listener listener/metadata 0/0/0/13/13 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:36002 [21/Mar/2026:14:38:56.574] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:36014 [21/Mar/2026:14:38:56.629] listener listener/metadata 0/0/0/14/14 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Mar 21 14:38:56 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.12:36026 [21/Mar/2026:14:38:56.701] listener listener/metadata 0/0/0/13/13 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Mar 21 14:38:58 np0005654373.novalocal sudo[103628]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:38:58 np0005654373.novalocal systemd[1]: Started Session c277 of User root. Mar 21 14:38:58 np0005654373.novalocal sudo[103628]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:58 np0005654373.novalocal sudo[103628]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:58 np0005654373.novalocal systemd[1]: session-c277.scope: Deactivated successfully. Mar 21 14:38:58 np0005654373.novalocal sudo[103632]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:38:59 np0005654373.novalocal systemd[1]: Started Session c278 of User root. Mar 21 14:38:59 np0005654373.novalocal sudo[103632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:59 np0005654373.novalocal sudo[103632]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:59 np0005654373.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Mar 21 14:38:59 np0005654373.novalocal sudo[103636]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:38:59 np0005654373.novalocal systemd[1]: Started Session c279 of User root. Mar 21 14:38:59 np0005654373.novalocal sudo[103636]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:38:59 np0005654373.novalocal sudo[103636]: pam_unix(sudo:session): session closed for user root Mar 21 14:38:59 np0005654373.novalocal systemd[1]: session-c279.scope: Deactivated successfully. Mar 21 14:38:59 np0005654373.novalocal sudo[103641]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:38:59 np0005654373.novalocal systemd[1]: Started Session c280 of User root. Mar 21 14:38:59 np0005654373.novalocal sudo[103641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:39:00 np0005654373.novalocal sudo[103641]: pam_unix(sudo:session): session closed for user root Mar 21 14:39:00 np0005654373.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Mar 21 14:39:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:39:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:39:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:39:03 np0005654373.novalocal sshd-session[103676]: Connection reset by authenticating user root 2.57.121.86 port 64336 [preauth] Mar 21 14:39:19 np0005654373.novalocal kernel: tapb62daa64-ac: entered promiscuous mode Mar 21 14:39:19 np0005654373.novalocal NetworkManager[871]: [1774118359.0983] manager: (tapb62daa64-ac): new Tun device (/org/freedesktop/NetworkManager/Devices/33) Mar 21 14:39:19 np0005654373.novalocal virtqemud[96706]: Domain id=11 name='instance-0000000a' uuid=9b51c8f4-8f9f-4797-9422-4402758f4462 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:39:19 np0005654373.novalocal virtqemud[96706]: Domain id=11 name='instance-0000000a' uuid=9b51c8f4-8f9f-4797-9422-4402758f4462 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:39:19 np0005654373.novalocal systemd-machined[93279]: New machine qemu-11-instance-0000000a. Mar 21 14:39:19 np0005654373.novalocal systemd-udevd[103735]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:39:19 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Mar 21 14:39:19 np0005654373.novalocal NetworkManager[871]: [1774118359.1744] device (tapb62daa64-ac): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:39:19 np0005654373.novalocal NetworkManager[871]: [1774118359.1751] device (tapb62daa64-ac): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48326 [21/Mar/2026:14:39:40.313] listener listener/metadata 0/0/0/140/140 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48336 [21/Mar/2026:14:39:40.537] listener listener/metadata 0/0/0/15/15 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48352 [21/Mar/2026:14:39:40.581] listener listener/metadata 0/0/0/13/13 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48362 [21/Mar/2026:14:39:40.638] listener listener/metadata 0/0/0/10/10 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48376 [21/Mar/2026:14:39:40.694] listener listener/metadata 0/0/0/14/14 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48380 [21/Mar/2026:14:39:40.786] listener listener/metadata 0/0/0/15/15 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48382 [21/Mar/2026:14:39:40.862] listener listener/metadata 0/0/0/10/10 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48384 [21/Mar/2026:14:39:40.923] listener listener/metadata 0/0/0/9/9 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Mar 21 14:39:40 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48390 [21/Mar/2026:14:39:40.975] listener listener/metadata 0/0/0/12/12 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Mar 21 14:39:41 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48394 [21/Mar/2026:14:39:41.031] listener listener/metadata 0/0/0/11/11 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Mar 21 14:39:41 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48396 [21/Mar/2026:14:39:41.089] listener listener/metadata 0/0/0/15/15 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Mar 21 14:39:41 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48404 [21/Mar/2026:14:39:41.185] listener listener/metadata 0/0/0/16/16 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Mar 21 14:39:41 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48406 [21/Mar/2026:14:39:41.248] listener listener/metadata 0/0/0/13/13 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Mar 21 14:39:41 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48412 [21/Mar/2026:14:39:41.300] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Mar 21 14:39:41 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48420 [21/Mar/2026:14:39:41.362] listener listener/metadata 0/0/0/13/13 200 142 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Mar 21 14:39:41 np0005654373.novalocal haproxy-metadata-proxy-21585ead-b95e-4817-aa41-385782851521[103520]: 10.100.0.3:48428 [21/Mar/2026:14:39:41.420] listener listener/metadata 0/0/0/14/14 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Mar 21 14:39:46 np0005654373.novalocal kernel: tapb62daa64-ac (unregistering): left promiscuous mode Mar 21 14:39:46 np0005654373.novalocal NetworkManager[871]: [1774118386.8007] device (tapb62daa64-ac): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:39:46 np0005654373.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Mar 21 14:39:46 np0005654373.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 18.303s CPU time. Mar 21 14:39:46 np0005654373.novalocal systemd-machined[93279]: Machine qemu-11-instance-0000000a terminated. Mar 21 14:39:57 np0005654373.novalocal kernel: tapb276a2ef-b2 (unregistering): left promiscuous mode Mar 21 14:39:57 np0005654373.novalocal NetworkManager[871]: [1774118397.7802] device (tapb276a2ef-b2): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:39:57 np0005654373.novalocal systemd[1]: session-c276.scope: Deactivated successfully. Mar 21 14:39:57 np0005654373.novalocal kernel: tap21585ead-b0: left promiscuous mode Mar 21 14:39:57 np0005654373.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Mar 21 14:39:57 np0005654373.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 20.863s CPU time. Mar 21 14:39:57 np0005654373.novalocal systemd-machined[93279]: Machine qemu-10-instance-00000009 terminated. Mar 21 14:39:58 np0005654373.novalocal sudo[103939]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:39:58 np0005654373.novalocal systemd[1]: Started Session c281 of User root. Mar 21 14:39:58 np0005654373.novalocal sudo[103939]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:39:58 np0005654373.novalocal sudo[103939]: pam_unix(sudo:session): session closed for user root Mar 21 14:39:58 np0005654373.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Mar 21 14:39:58 np0005654373.novalocal sudo[103944]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:39:59 np0005654373.novalocal systemd[1]: Started Session c282 of User root. Mar 21 14:39:59 np0005654373.novalocal sudo[103944]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:39:59 np0005654373.novalocal sudo[103944]: pam_unix(sudo:session): session closed for user root Mar 21 14:39:59 np0005654373.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Mar 21 14:39:59 np0005654373.novalocal sudo[103949]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:39:59 np0005654373.novalocal systemd[1]: Started Session c283 of User root. Mar 21 14:39:59 np0005654373.novalocal sudo[103949]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:39:59 np0005654373.novalocal sudo[103949]: pam_unix(sudo:session): session closed for user root Mar 21 14:39:59 np0005654373.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Mar 21 14:39:59 np0005654373.novalocal sudo[103954]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:39:59 np0005654373.novalocal systemd[1]: Started Session c284 of User root. Mar 21 14:39:59 np0005654373.novalocal sudo[103954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:39:59 np0005654373.novalocal sshd-session[103942]: Invalid user debian from 185.156.73.233 port 30792 Mar 21 14:40:00 np0005654373.novalocal sshd-session[103942]: Connection closed by invalid user debian 185.156.73.233 port 30792 [preauth] Mar 21 14:40:00 np0005654373.novalocal sudo[103954]: pam_unix(sudo:session): session closed for user root Mar 21 14:40:00 np0005654373.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Mar 21 14:40:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:40:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:40:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:40:38 np0005654373.novalocal kernel: tapff4a9787-16: entered promiscuous mode Mar 21 14:40:38 np0005654373.novalocal NetworkManager[871]: [1774118438.7839] manager: (tapff4a9787-16): new Tun device (/org/freedesktop/NetworkManager/Devices/34) Mar 21 14:40:38 np0005654373.novalocal virtqemud[96706]: Domain id=12 name='instance-0000000b' uuid=416eb094-ae26-467c-8b43-9a82e5b2a179 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Mar 21 14:40:38 np0005654373.novalocal virtqemud[96706]: Domain id=12 name='instance-0000000b' uuid=416eb094-ae26-467c-8b43-9a82e5b2a179 is tainted: deprecated-config (CPU model 'qemu64') Mar 21 14:40:38 np0005654373.novalocal systemd-machined[93279]: New machine qemu-12-instance-0000000b. Mar 21 14:40:38 np0005654373.novalocal systemd[1]: Started Virtual Machine qemu-12-instance-0000000b. Mar 21 14:40:38 np0005654373.novalocal systemd-udevd[104040]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:40:38 np0005654373.novalocal NetworkManager[871]: [1774118438.8859] device (tapff4a9787-16): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Mar 21 14:40:38 np0005654373.novalocal NetworkManager[871]: [1774118438.8865] device (tapff4a9787-16): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Mar 21 14:40:38 np0005654373.novalocal NetworkManager[871]: [1774118438.8934] manager: (tap01698151-80): new Veth device (/org/freedesktop/NetworkManager/Devices/35) Mar 21 14:40:38 np0005654373.novalocal systemd-udevd[104043]: Network interface NamePolicy= disabled on kernel command line. Mar 21 14:40:38 np0005654373.novalocal NetworkManager[871]: [1774118438.9377] device (tap01698151-80): carrier: link connected Mar 21 14:40:39 np0005654373.novalocal kernel: tap01698151-80: entered promiscuous mode Mar 21 14:40:39 np0005654373.novalocal sudo[104085]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-01698151-8356-485c-a540-f87376f0f0a6 env PROCESS_TAG=haproxy-01698151-8356-485c-a540-f87376f0f0a6 haproxy -f /var/lib/neutron/ovn-metadata-proxy/01698151-8356-485c-a540-f87376f0f0a6.conf Mar 21 14:40:39 np0005654373.novalocal systemd[1]: Started Session c285 of User root. Mar 21 14:40:39 np0005654373.novalocal sudo[104085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Mar 21 14:40:39 np0005654373.novalocal sudo[104085]: pam_unix(sudo:session): session closed for user root Mar 21 14:40:58 np0005654373.novalocal sudo[104174]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:40:58 np0005654373.novalocal systemd[1]: Started Session c286 of User root. Mar 21 14:40:58 np0005654373.novalocal sudo[104174]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:40:58 np0005654373.novalocal sudo[104174]: pam_unix(sudo:session): session closed for user root Mar 21 14:40:58 np0005654373.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Mar 21 14:40:58 np0005654373.novalocal sudo[104178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:40:58 np0005654373.novalocal systemd[1]: Started Session c287 of User root. Mar 21 14:40:58 np0005654373.novalocal sudo[104178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:40:59 np0005654373.novalocal sudo[104178]: pam_unix(sudo:session): session closed for user root Mar 21 14:40:59 np0005654373.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Mar 21 14:40:59 np0005654373.novalocal sudo[104183]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:40:59 np0005654373.novalocal systemd[1]: Started Session c288 of User root. Mar 21 14:40:59 np0005654373.novalocal sudo[104183]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:40:59 np0005654373.novalocal sudo[104183]: pam_unix(sudo:session): session closed for user root Mar 21 14:40:59 np0005654373.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Mar 21 14:40:59 np0005654373.novalocal sudo[104187]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:40:59 np0005654373.novalocal systemd[1]: Started Session c289 of User root. Mar 21 14:40:59 np0005654373.novalocal sudo[104187]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:40:59 np0005654373.novalocal sudo[104187]: pam_unix(sudo:session): session closed for user root Mar 21 14:40:59 np0005654373.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Mar 21 14:41:01 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:41:01 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:41:01 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:41:07 np0005654373.novalocal haproxy-metadata-proxy-01698151-8356-485c-a540-f87376f0f0a6[104091]: 10.100.0.13:54958 [21/Mar/2026:14:41:06.310] listener listener/metadata 0/0/0/971/971 200 98 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Mar 21 14:41:07 np0005654373.novalocal haproxy-metadata-proxy-01698151-8356-485c-a540-f87376f0f0a6[104091]: 10.100.0.13:54964 [21/Mar/2026:14:41:07.563] listener listener/metadata 0/0/0/219/219 200 85 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Mar 21 14:41:11 np0005654373.novalocal kernel: tapff4a9787-16 (unregistering): left promiscuous mode Mar 21 14:41:11 np0005654373.novalocal NetworkManager[871]: [1774118471.8800] device (tapff4a9787-16): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Mar 21 14:41:11 np0005654373.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Deactivated successfully. Mar 21 14:41:11 np0005654373.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Consumed 20.407s CPU time. Mar 21 14:41:11 np0005654373.novalocal systemd-machined[93279]: Machine qemu-12-instance-0000000b terminated. Mar 21 14:41:11 np0005654373.novalocal kernel: tap01698151-80: left promiscuous mode Mar 21 14:41:11 np0005654373.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Mar 21 14:41:42 np0005654373.novalocal sshd-session[104318]: Connection reset by authenticating user root 195.178.110.15 port 36572 [preauth] Mar 21 14:41:58 np0005654373.novalocal sudo[104369]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:41:58 np0005654373.novalocal systemd[1]: Started Session c290 of User root. Mar 21 14:41:58 np0005654373.novalocal sudo[104369]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:41:58 np0005654373.novalocal sudo[104369]: pam_unix(sudo:session): session closed for user root Mar 21 14:41:58 np0005654373.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Mar 21 14:41:58 np0005654373.novalocal sudo[104373]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:41:58 np0005654373.novalocal systemd[1]: Started Session c291 of User root. Mar 21 14:41:58 np0005654373.novalocal sudo[104373]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:41:59 np0005654373.novalocal sudo[104373]: pam_unix(sudo:session): session closed for user root Mar 21 14:41:59 np0005654373.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Mar 21 14:41:59 np0005654373.novalocal sudo[104377]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:41:59 np0005654373.novalocal systemd[1]: Started Session c292 of User root. Mar 21 14:41:59 np0005654373.novalocal sudo[104377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:41:59 np0005654373.novalocal sudo[104377]: pam_unix(sudo:session): session closed for user root Mar 21 14:41:59 np0005654373.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Mar 21 14:41:59 np0005654373.novalocal sudo[104384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:41:59 np0005654373.novalocal systemd[1]: Started Session c293 of User root. Mar 21 14:41:59 np0005654373.novalocal sudo[104384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:41:59 np0005654373.novalocal sudo[104384]: pam_unix(sudo:session): session closed for user root Mar 21 14:41:59 np0005654373.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Mar 21 14:42:01 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:42:01 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:42:01 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:42:05 np0005654373.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 22117eb0-8375-441f-8f00-a439c4201f68 r/w with ordered data mode. Quota mode: none. Mar 21 14:42:09 np0005654373.novalocal systemd[1]: var-lib-manila-mnt-share\x2de9a61e5e\x2df6f0\x2d43ce\x2da1a3\x2d30ad21d46c5b.mount: Deactivated successfully. Mar 21 14:42:09 np0005654373.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 22117eb0-8375-441f-8f00-a439c4201f68. Mar 21 14:42:09 np0005654373.novalocal sudo[104423]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/manila-rootwrap /etc/manila/rootwrap.conf exportfs Mar 21 14:42:09 np0005654373.novalocal systemd[1]: Started Session c294 of User root. Mar 21 14:42:09 np0005654373.novalocal sudo[104423]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Mar 21 14:42:09 np0005654373.novalocal sudo[104423]: pam_unix(sudo:session): session closed for user root Mar 21 14:42:09 np0005654373.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Mar 21 14:42:58 np0005654373.novalocal sudo[104501]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:42:58 np0005654373.novalocal systemd[1]: Started Session c295 of User root. Mar 21 14:42:58 np0005654373.novalocal sudo[104501]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:42:58 np0005654373.novalocal sudo[104501]: pam_unix(sudo:session): session closed for user root Mar 21 14:42:58 np0005654373.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Mar 21 14:42:58 np0005654373.novalocal sudo[104505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:42:58 np0005654373.novalocal systemd[1]: Started Session c296 of User root. Mar 21 14:42:58 np0005654373.novalocal sudo[104505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:42:59 np0005654373.novalocal sudo[104505]: pam_unix(sudo:session): session closed for user root Mar 21 14:42:59 np0005654373.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Mar 21 14:42:59 np0005654373.novalocal sudo[104510]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:42:59 np0005654373.novalocal systemd[1]: Started Session c297 of User root. Mar 21 14:42:59 np0005654373.novalocal sudo[104510]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:42:59 np0005654373.novalocal sudo[104510]: pam_unix(sudo:session): session closed for user root Mar 21 14:42:59 np0005654373.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Mar 21 14:42:59 np0005654373.novalocal sudo[104514]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:42:59 np0005654373.novalocal systemd[1]: Started Session c298 of User root. Mar 21 14:42:59 np0005654373.novalocal sudo[104514]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:42:59 np0005654373.novalocal sudo[104514]: pam_unix(sudo:session): session closed for user root Mar 21 14:42:59 np0005654373.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Mar 21 14:43:01 np0005654373.novalocal sudo[54932]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:02 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:43:02 np0005654373.novalocal sudo[105247]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dutpgddnhzmqkrqoaloedeidknfxnplc ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Mar 21 14:43:02 np0005654373.novalocal sudo[105247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:43:02 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:43:02 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:43:02 np0005654373.novalocal python3[105250]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Mar 21 14:43:03 np0005654373.novalocal sudo[105373]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105373]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105376]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105376]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105379]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105382]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105385]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105385]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105388]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105388]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105391]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105391]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105394]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105394]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105397]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105397]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105400]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105400]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105403]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105403]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105406]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105406]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105409]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105409]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105412]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105412]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105415]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105415]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105418]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105418]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105421]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105421]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105424]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105424]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105427]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105427]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105430]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Mar 21 14:43:03 np0005654373.novalocal sudo[105430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105430]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105433]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Mar 21 14:43:03 np0005654373.novalocal sudo[105433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105433]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105436]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Mar 21 14:43:03 np0005654373.novalocal sudo[105436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:03 np0005654373.novalocal sudo[105436]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:03 np0005654373.novalocal sudo[105440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Mar 21 14:43:03 np0005654373.novalocal sudo[105440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105440]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105443]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105446]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Mar 21 14:43:04 np0005654373.novalocal sudo[105449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105449]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105452]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105455]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Mar 21 14:43:04 np0005654373.novalocal sudo[105455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105455]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105458]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105458]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105461]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105461]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105464]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105464]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105467]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105467]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105470]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Mar 21 14:43:04 np0005654373.novalocal sudo[105473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105473]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Mar 21 14:43:04 np0005654373.novalocal sudo[105476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105476]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105479]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105482]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105485]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105488]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Mar 21 14:43:04 np0005654373.novalocal sudo[105491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal virtqemud[96706]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Mar 21 14:43:04 np0005654373.novalocal sudo[105491]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105495]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Mar 21 14:43:04 np0005654373.novalocal sudo[105498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105498]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Mar 21 14:43:04 np0005654373.novalocal sudo[105501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105501]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105504]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105508]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Mar 21 14:43:04 np0005654373.novalocal sudo[105508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105508]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105511]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Mar 21 14:43:04 np0005654373.novalocal sudo[105511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105511]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105514]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Mar 21 14:43:04 np0005654373.novalocal sudo[105514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105514]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105517]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Mar 21 14:43:04 np0005654373.novalocal sudo[105517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105517]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Mar 21 14:43:04 np0005654373.novalocal sudo[105520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105520]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105523]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Mar 21 14:43:04 np0005654373.novalocal sudo[105523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105523]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105526]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Mar 21 14:43:04 np0005654373.novalocal sudo[105526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105526]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Mar 21 14:43:04 np0005654373.novalocal sudo[105529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:04 np0005654373.novalocal sudo[105529]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:04 np0005654373.novalocal sudo[105532]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Mar 21 14:43:04 np0005654373.novalocal sudo[105532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105532]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105535]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105535]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105539]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Mar 21 14:43:05 np0005654373.novalocal sudo[105539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105539]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-neutron_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Mar 21 14:43:05 np0005654373.novalocal sudo[105543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105543]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105547]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Mar 21 14:43:05 np0005654373.novalocal sudo[105547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105547]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105550]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Mar 21 14:43:05 np0005654373.novalocal sudo[105550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105550]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105553]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Mar 21 14:43:05 np0005654373.novalocal sudo[105553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105553]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Mar 21 14:43:05 np0005654373.novalocal sudo[105556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105556]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105559]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105562]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Mar 21 14:43:05 np0005654373.novalocal sudo[105562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105562]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105565]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Mar 21 14:43:05 np0005654373.novalocal sudo[105568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105568]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105572]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105575]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105578]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105581]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105584]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105587]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105590]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105593]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105596]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105599]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105602]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Mar 21 14:43:05 np0005654373.novalocal sudo[105605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105605]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:05 np0005654373.novalocal sudo[105609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Mar 21 14:43:05 np0005654373.novalocal sudo[105609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:05 np0005654373.novalocal sudo[105609]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:06 np0005654373.novalocal sudo[105616]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Mar 21 14:43:06 np0005654373.novalocal sudo[105616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:07 np0005654373.novalocal sudo[105616]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:07 np0005654373.novalocal sudo[105620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Mar 21 14:43:07 np0005654373.novalocal sudo[105620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:08 np0005654373.novalocal sudo[105620]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:08 np0005654373.novalocal sudo[105625]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Mar 21 14:43:08 np0005654373.novalocal sudo[105625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:09 np0005654373.novalocal sudo[105625]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:09 np0005654373.novalocal sudo[105628]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Mar 21 14:43:09 np0005654373.novalocal sudo[105628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:09 np0005654373.novalocal sudo[105628]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:09 np0005654373.novalocal sudo[105632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Mar 21 14:43:09 np0005654373.novalocal sudo[105632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:09 np0005654373.novalocal sudo[105632]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:09 np0005654373.novalocal sudo[105635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Mar 21 14:43:09 np0005654373.novalocal sudo[105635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:09 np0005654373.novalocal sudo[105635]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Mar 21 14:43:10 np0005654373.novalocal sudo[105642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105642]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Mar 21 14:43:10 np0005654373.novalocal sudo[105645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105645]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Mar 21 14:43:10 np0005654373.novalocal sudo[105648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105648]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Mar 21 14:43:10 np0005654373.novalocal sudo[105651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105651]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Mar 21 14:43:10 np0005654373.novalocal sudo[105659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105659]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Mar 21 14:43:10 np0005654373.novalocal sudo[105662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105662]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Mar 21 14:43:10 np0005654373.novalocal sudo[105668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105668]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Mar 21 14:43:10 np0005654373.novalocal sudo[105671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105671]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Mar 21 14:43:10 np0005654373.novalocal sudo[105675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105675]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl list connection Mar 21 14:43:10 np0005654373.novalocal sudo[105678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105678]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Mar 21 14:43:10 np0005654373.novalocal sudo[105681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105681]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105685]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Mar 21 14:43:10 np0005654373.novalocal sudo[105685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105685]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105688]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl list connection Mar 21 14:43:10 np0005654373.novalocal sudo[105688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105688]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105691]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Mar 21 14:43:10 np0005654373.novalocal sudo[105691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105691]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105694]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Mar 21 14:43:10 np0005654373.novalocal sudo[105694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:10 np0005654373.novalocal sudo[105694]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:10 np0005654373.novalocal sudo[105697]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Mar 21 14:43:10 np0005654373.novalocal sudo[105697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:12 np0005654373.novalocal sudo[105697]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:12 np0005654373.novalocal sudo[105700]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Mar 21 14:43:12 np0005654373.novalocal sudo[105700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:12 np0005654373.novalocal sudo[105700]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:12 np0005654373.novalocal sudo[105703]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Mar 21 14:43:12 np0005654373.novalocal sudo[105703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:12 np0005654373.novalocal sudo[105703]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:12 np0005654373.novalocal sudo[105706]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Mar 21 14:43:12 np0005654373.novalocal sudo[105706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:12 np0005654373.novalocal sudo[105706]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:12 np0005654373.novalocal sudo[105709]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Mar 21 14:43:12 np0005654373.novalocal sudo[105709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:12 np0005654373.novalocal sudo[105709]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:12 np0005654373.novalocal sudo[105712]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Mar 21 14:43:12 np0005654373.novalocal sudo[105712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:12 np0005654373.novalocal sudo[105712]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:12 np0005654373.novalocal sudo[105715]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Mar 21 14:43:12 np0005654373.novalocal sudo[105715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:12 np0005654373.novalocal sudo[105715]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:12 np0005654373.novalocal sudo[105718]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Mar 21 14:43:12 np0005654373.novalocal sudo[105718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:13 np0005654373.novalocal sudo[105718]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:13 np0005654373.novalocal sudo[105721]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Mar 21 14:43:13 np0005654373.novalocal sudo[105721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:13 np0005654373.novalocal sudo[105721]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:13 np0005654373.novalocal sudo[105724]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Mar 21 14:43:13 np0005654373.novalocal sudo[105724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:13 np0005654373.novalocal sudo[105724]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:13 np0005654373.novalocal sudo[105727]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Mar 21 14:43:13 np0005654373.novalocal sudo[105727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:13 np0005654373.novalocal sudo[105727]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:13 np0005654373.novalocal sudo[105731]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Mar 21 14:43:13 np0005654373.novalocal sudo[105731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:13 np0005654373.novalocal sudo[105731]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:18 np0005654373.novalocal sudo[105743]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Mar 21 14:43:18 np0005654373.novalocal sudo[105743]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Mar 21 14:43:21 np0005654373.novalocal sudo[105743]: pam_unix(sudo:session): session closed for user nova Mar 21 14:43:21 np0005654373.novalocal sudo[105749]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Mar 21 14:43:21 np0005654373.novalocal sudo[105749]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Mar 21 14:43:23 np0005654373.novalocal sudo[105749]: pam_unix(sudo:session): session closed for user nova Mar 21 14:43:34 np0005654373.novalocal sudo[105777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Mar 21 14:43:34 np0005654373.novalocal sudo[105777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105780]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Mar 21 14:43:34 np0005654373.novalocal sudo[105780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105780]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105783]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Mar 21 14:43:34 np0005654373.novalocal sudo[105783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105783]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105786]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Mar 21 14:43:34 np0005654373.novalocal sudo[105786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105786]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105789]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Mar 21 14:43:34 np0005654373.novalocal sudo[105789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105789]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105792]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Mar 21 14:43:34 np0005654373.novalocal sudo[105792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105792]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105795]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Mar 21 14:43:34 np0005654373.novalocal sudo[105795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105795]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105798]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:34 np0005654373.novalocal sudo[105798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105798]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105801]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:34 np0005654373.novalocal sudo[105801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105801]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105804]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Mar 21 14:43:34 np0005654373.novalocal sudo[105804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105804]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105807]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Mar 21 14:43:34 np0005654373.novalocal sudo[105807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105807]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105810]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Mar 21 14:43:34 np0005654373.novalocal sudo[105810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105810]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105813]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Mar 21 14:43:34 np0005654373.novalocal sudo[105813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105813]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105816]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Mar 21 14:43:34 np0005654373.novalocal sudo[105816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105816]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105819]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:34 np0005654373.novalocal sudo[105819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105819]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105822]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:34 np0005654373.novalocal sudo[105822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105822]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105825]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Mar 21 14:43:34 np0005654373.novalocal sudo[105825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105825]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105828]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Mar 21 14:43:34 np0005654373.novalocal sudo[105828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105828]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105831]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:34 np0005654373.novalocal sudo[105831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105831]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105834]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:34 np0005654373.novalocal sudo[105834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105834]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105837]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Mar 21 14:43:34 np0005654373.novalocal sudo[105837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105837]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105840]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Mar 21 14:43:34 np0005654373.novalocal sudo[105840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105840]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105843]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Mar 21 14:43:34 np0005654373.novalocal sudo[105843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105843]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105846]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:34 np0005654373.novalocal sudo[105846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105846]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105849]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:34 np0005654373.novalocal sudo[105849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105849]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105852]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Mar 21 14:43:34 np0005654373.novalocal sudo[105852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105852]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105855]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Mar 21 14:43:34 np0005654373.novalocal sudo[105855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105855]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105858]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Mar 21 14:43:34 np0005654373.novalocal sudo[105858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105858]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105861]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Mar 21 14:43:34 np0005654373.novalocal sudo[105861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105861]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105864]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Mar 21 14:43:34 np0005654373.novalocal sudo[105864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105864]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:34 np0005654373.novalocal sudo[105867]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Mar 21 14:43:34 np0005654373.novalocal sudo[105867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:34 np0005654373.novalocal sudo[105867]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105870]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Mar 21 14:43:35 np0005654373.novalocal sudo[105870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105870]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105873]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Mar 21 14:43:35 np0005654373.novalocal sudo[105873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105873]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105876]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Mar 21 14:43:35 np0005654373.novalocal sudo[105876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105876]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105879]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Mar 21 14:43:35 np0005654373.novalocal sudo[105879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105879]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105882]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Mar 21 14:43:35 np0005654373.novalocal sudo[105882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105882]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105885]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-rpc-server Mar 21 14:43:35 np0005654373.novalocal sudo[105885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105885]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105888]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Mar 21 14:43:35 np0005654373.novalocal sudo[105888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105888]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105891]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Mar 21 14:43:35 np0005654373.novalocal sudo[105891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105891]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105894]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Mar 21 14:43:35 np0005654373.novalocal sudo[105894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105894]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105897]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Mar 21 14:43:35 np0005654373.novalocal sudo[105897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105897]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105900]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:35 np0005654373.novalocal sudo[105900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105900]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105903]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:35 np0005654373.novalocal sudo[105903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105903]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105906]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Mar 21 14:43:35 np0005654373.novalocal sudo[105906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105906]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105909]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:35 np0005654373.novalocal sudo[105909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105909]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105912]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:35 np0005654373.novalocal sudo[105912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105912]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105915]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Mar 21 14:43:35 np0005654373.novalocal sudo[105915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105915]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105918]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Mar 21 14:43:35 np0005654373.novalocal sudo[105918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105918]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105921]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:35 np0005654373.novalocal sudo[105921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105921]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105924]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:35 np0005654373.novalocal sudo[105924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105924]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105927]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Mar 21 14:43:35 np0005654373.novalocal sudo[105927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105927]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105930]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Mar 21 14:43:35 np0005654373.novalocal sudo[105930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105930]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105933]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Mar 21 14:43:35 np0005654373.novalocal sudo[105933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105933]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105936]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Mar 21 14:43:35 np0005654373.novalocal sudo[105936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105936]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105939]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Mar 21 14:43:35 np0005654373.novalocal sudo[105939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105939]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105942]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Mar 21 14:43:35 np0005654373.novalocal sudo[105942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105942]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105945]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Mar 21 14:43:35 np0005654373.novalocal sudo[105945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105945]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105948]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Mar 21 14:43:35 np0005654373.novalocal sudo[105948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105948]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105951]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Mar 21 14:43:35 np0005654373.novalocal sudo[105951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105951]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105954]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:35 np0005654373.novalocal sudo[105954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105954]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105957]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:35 np0005654373.novalocal sudo[105957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105957]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105960]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Mar 21 14:43:35 np0005654373.novalocal sudo[105960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105960]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105963]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Mar 21 14:43:35 np0005654373.novalocal sudo[105963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105963]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105966]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Mar 21 14:43:35 np0005654373.novalocal sudo[105966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105966]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105969]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:35 np0005654373.novalocal sudo[105969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105969]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105972]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:35 np0005654373.novalocal sudo[105972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105972]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105975]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Mar 21 14:43:35 np0005654373.novalocal sudo[105975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:35 np0005654373.novalocal sudo[105975]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:35 np0005654373.novalocal sudo[105978]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Mar 21 14:43:36 np0005654373.novalocal sudo[105978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105978]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[105981]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Mar 21 14:43:36 np0005654373.novalocal sudo[105981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105981]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[105984]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Mar 21 14:43:36 np0005654373.novalocal sudo[105984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105984]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[105987]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Mar 21 14:43:36 np0005654373.novalocal sudo[105987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105987]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[105990]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Mar 21 14:43:36 np0005654373.novalocal sudo[105990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105990]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[105993]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Mar 21 14:43:36 np0005654373.novalocal sudo[105993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105993]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[105996]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Mar 21 14:43:36 np0005654373.novalocal sudo[105996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105996]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[105999]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Mar 21 14:43:36 np0005654373.novalocal sudo[105999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[105999]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106002]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Mar 21 14:43:36 np0005654373.novalocal sudo[106002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106002]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106005]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Mar 21 14:43:36 np0005654373.novalocal sudo[106005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106005]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106008]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Mar 21 14:43:36 np0005654373.novalocal sudo[106008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106008]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106011]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Mar 21 14:43:36 np0005654373.novalocal sudo[106011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106011]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106014]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Mar 21 14:43:36 np0005654373.novalocal sudo[106014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106014]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106017]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Mar 21 14:43:36 np0005654373.novalocal sudo[106017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106017]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106020]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Mar 21 14:43:36 np0005654373.novalocal sudo[106020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106020]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106023]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Mar 21 14:43:36 np0005654373.novalocal sudo[106023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106023]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106026]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Mar 21 14:43:36 np0005654373.novalocal sudo[106026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106026]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106029]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:36 np0005654373.novalocal sudo[106029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106029]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106032]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Mar 21 14:43:36 np0005654373.novalocal sudo[106032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106032]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106035]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Mar 21 14:43:36 np0005654373.novalocal sudo[106035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106035]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106038]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Mar 21 14:43:36 np0005654373.novalocal sudo[106038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106038]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106041]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Mar 21 14:43:36 np0005654373.novalocal sudo[106041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106041]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106044]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Mar 21 14:43:36 np0005654373.novalocal sudo[106044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106044]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106047]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Mar 21 14:43:36 np0005654373.novalocal sudo[106047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106047]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106050]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Mar 21 14:43:36 np0005654373.novalocal sudo[106050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106050]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106053]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Mar 21 14:43:36 np0005654373.novalocal sudo[106053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106053]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106056]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Mar 21 14:43:36 np0005654373.novalocal sudo[106056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106056]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106059]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Mar 21 14:43:36 np0005654373.novalocal sudo[106059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106059]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106062]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Mar 21 14:43:36 np0005654373.novalocal sudo[106062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106062]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106065]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Mar 21 14:43:36 np0005654373.novalocal sudo[106065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106065]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106068]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Mar 21 14:43:36 np0005654373.novalocal sudo[106068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106068]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106071]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Mar 21 14:43:36 np0005654373.novalocal sudo[106071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106071]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106074]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Mar 21 14:43:36 np0005654373.novalocal sudo[106074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106074]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106077]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Mar 21 14:43:36 np0005654373.novalocal sudo[106077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106077]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106080]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Mar 21 14:43:36 np0005654373.novalocal sudo[106080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106080]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106083]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Mar 21 14:43:36 np0005654373.novalocal sudo[106083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106083]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106086]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Mar 21 14:43:36 np0005654373.novalocal sudo[106086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106086]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106089]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Mar 21 14:43:36 np0005654373.novalocal sudo[106089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106089]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106092]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Mar 21 14:43:36 np0005654373.novalocal sudo[106092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106092]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106095]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Mar 21 14:43:36 np0005654373.novalocal sudo[106095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106095]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:36 np0005654373.novalocal sudo[106098]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Mar 21 14:43:36 np0005654373.novalocal sudo[106098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:36 np0005654373.novalocal sudo[106098]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106101]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Mar 21 14:43:37 np0005654373.novalocal sudo[106101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106101]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106104]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Mar 21 14:43:37 np0005654373.novalocal sudo[106104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106104]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106107]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Mar 21 14:43:37 np0005654373.novalocal sudo[106107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106107]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106110]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Mar 21 14:43:37 np0005654373.novalocal sudo[106110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106110]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106113]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Mar 21 14:43:37 np0005654373.novalocal sudo[106113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106113]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106116]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Mar 21 14:43:37 np0005654373.novalocal sudo[106116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106116]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106119]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Mar 21 14:43:37 np0005654373.novalocal sudo[106119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106119]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106122]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Mar 21 14:43:37 np0005654373.novalocal sudo[106122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106122]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[105777]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Mar 21 14:43:37 np0005654373.novalocal sudo[106125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106128]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260321_142747.log Mar 21 14:43:37 np0005654373.novalocal sudo[106128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106128]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106131]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260321_143035.log Mar 21 14:43:37 np0005654373.novalocal sudo[106131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106131]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106134]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Mar 21 14:43:37 np0005654373.novalocal sudo[106134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106134]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106137]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Mar 21 14:43:37 np0005654373.novalocal sudo[106137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106137]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106140]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Mar 21 14:43:37 np0005654373.novalocal sudo[106140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106140]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106143]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Mar 21 14:43:37 np0005654373.novalocal sudo[106143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106143]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106146]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Mar 21 14:43:37 np0005654373.novalocal sudo[106146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106146]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106149]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Mar 21 14:43:37 np0005654373.novalocal sudo[106149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106149]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106152]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Mar 21 14:43:37 np0005654373.novalocal sudo[106152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106152]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106155]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Mar 21 14:43:37 np0005654373.novalocal sudo[106155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106155]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106158]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Mar 21 14:43:37 np0005654373.novalocal sudo[106158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106158]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106161]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Mar 21 14:43:37 np0005654373.novalocal sudo[106161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106161]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106164]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Mar 21 14:43:37 np0005654373.novalocal sudo[106164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106164]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106167]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Mar 21 14:43:37 np0005654373.novalocal sudo[106167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106167]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106170]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Mar 21 14:43:37 np0005654373.novalocal sudo[106170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106170]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106173]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Mar 21 14:43:37 np0005654373.novalocal sudo[106173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106173]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106176]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Mar 21 14:43:37 np0005654373.novalocal sudo[106176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106176]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106179]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Mar 21 14:43:37 np0005654373.novalocal sudo[106179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106179]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106182]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Mar 21 14:43:37 np0005654373.novalocal sudo[106182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106182]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106185]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Mar 21 14:43:37 np0005654373.novalocal sudo[106185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106185]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106188]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Mar 21 14:43:37 np0005654373.novalocal sudo[106188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106188]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106191]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Mar 21 14:43:37 np0005654373.novalocal sudo[106191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106191]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106194]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Mar 21 14:43:37 np0005654373.novalocal sudo[106194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106194]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106197]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Mar 21 14:43:37 np0005654373.novalocal sudo[106197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106197]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:37 np0005654373.novalocal sudo[106200]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Mar 21 14:43:37 np0005654373.novalocal sudo[106200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:37 np0005654373.novalocal sudo[106200]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106203]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Mar 21 14:43:38 np0005654373.novalocal sudo[106203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106203]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106206]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Mar 21 14:43:38 np0005654373.novalocal sudo[106206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106206]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106209]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Mar 21 14:43:38 np0005654373.novalocal sudo[106209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106209]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106212]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:38 np0005654373.novalocal sudo[106212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106212]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106215]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 21 14:43:38 np0005654373.novalocal sudo[106215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106215]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106218]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106218]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106221]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Mar 21 14:43:38 np0005654373.novalocal sudo[106221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106221]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106224]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106224]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106227]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:38 np0005654373.novalocal sudo[106227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106227]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106230]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Mar 21 14:43:38 np0005654373.novalocal sudo[106230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106230]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106233]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106233]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106236]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106236]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106239]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106239]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106242]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106242]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106245]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106245]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106248]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 21 14:43:38 np0005654373.novalocal sudo[106248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106248]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106251]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Mar 21 14:43:38 np0005654373.novalocal sudo[106251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106251]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106254]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:38 np0005654373.novalocal sudo[106254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106254]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106259]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Mar 21 14:43:38 np0005654373.novalocal sudo[106259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106259]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106262]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Mar 21 14:43:38 np0005654373.novalocal sudo[106262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106262]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106265]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Mar 21 14:43:38 np0005654373.novalocal sudo[106265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106265]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106268]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Mar 21 14:43:38 np0005654373.novalocal sudo[106268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106268]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106271]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Mar 21 14:43:38 np0005654373.novalocal sudo[106271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106271]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106274]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Mar 21 14:43:38 np0005654373.novalocal sudo[106274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106274]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106277]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Mar 21 14:43:38 np0005654373.novalocal sudo[106277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106277]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106280]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Mar 21 14:43:38 np0005654373.novalocal sudo[106280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106280]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106283]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Mar 21 14:43:38 np0005654373.novalocal sudo[106283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106283]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106286]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Mar 21 14:43:38 np0005654373.novalocal sudo[106286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106286]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106289]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Mar 21 14:43:38 np0005654373.novalocal sudo[106289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106289]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106292]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Mar 21 14:43:38 np0005654373.novalocal sudo[106292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106292]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106295]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Mar 21 14:43:38 np0005654373.novalocal sudo[106295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106295]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106298]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Mar 21 14:43:38 np0005654373.novalocal sudo[106298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106298]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106301]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Mar 21 14:43:38 np0005654373.novalocal sudo[106301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106301]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106304]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Mar 21 14:43:38 np0005654373.novalocal sudo[106304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106304]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106307]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Mar 21 14:43:38 np0005654373.novalocal sudo[106307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:38 np0005654373.novalocal sudo[106307]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:38 np0005654373.novalocal sudo[106310]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Mar 21 14:43:39 np0005654373.novalocal sudo[106310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106310]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106313]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Mar 21 14:43:39 np0005654373.novalocal sudo[106313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106313]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106316]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Mar 21 14:43:39 np0005654373.novalocal sudo[106316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106316]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106319]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Mar 21 14:43:39 np0005654373.novalocal sudo[106319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106319]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106322]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Mar 21 14:43:39 np0005654373.novalocal sudo[106322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106322]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106325]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Mar 21 14:43:39 np0005654373.novalocal sudo[106325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106325]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106328]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Mar 21 14:43:39 np0005654373.novalocal sudo[106328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106328]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106331]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Mar 21 14:43:39 np0005654373.novalocal sudo[106331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106331]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106334]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Mar 21 14:43:39 np0005654373.novalocal sudo[106334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106334]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106337]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Mar 21 14:43:39 np0005654373.novalocal sudo[106337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106337]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106340]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Mar 21 14:43:39 np0005654373.novalocal sudo[106340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106340]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106343]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Mar 21 14:43:39 np0005654373.novalocal sudo[106343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106343]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106346]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Mar 21 14:43:39 np0005654373.novalocal sudo[106346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106346]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106349]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Mar 21 14:43:39 np0005654373.novalocal sudo[106349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106349]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106352]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Mar 21 14:43:39 np0005654373.novalocal sudo[106352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106352]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106355]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Mar 21 14:43:39 np0005654373.novalocal sudo[106355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106355]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106358]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:39 np0005654373.novalocal sudo[106358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106358]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106361]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:39 np0005654373.novalocal sudo[106361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106361]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106364]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Mar 21 14:43:39 np0005654373.novalocal sudo[106364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106364]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106367]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Mar 21 14:43:39 np0005654373.novalocal sudo[106367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106367]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106370]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Mar 21 14:43:39 np0005654373.novalocal sudo[106370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106370]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106373]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Mar 21 14:43:39 np0005654373.novalocal sudo[106373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106373]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106376]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Mar 21 14:43:39 np0005654373.novalocal sudo[106376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106376]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106379]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:39 np0005654373.novalocal sudo[106379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106379]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106382]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Mar 21 14:43:39 np0005654373.novalocal sudo[106382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106382]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106385]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Mar 21 14:43:39 np0005654373.novalocal sudo[106385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106385]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106388]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Mar 21 14:43:39 np0005654373.novalocal sudo[106388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106388]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106391]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 21 14:43:39 np0005654373.novalocal sudo[106391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106391]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106394]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Mar 21 14:43:39 np0005654373.novalocal sudo[106394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106394]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106397]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 21 14:43:39 np0005654373.novalocal sudo[106397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106397]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106400]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:39 np0005654373.novalocal sudo[106400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106400]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106403]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:39 np0005654373.novalocal sudo[106403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106403]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106406]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Mar 21 14:43:39 np0005654373.novalocal sudo[106406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106406]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106409]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Mar 21 14:43:39 np0005654373.novalocal sudo[106409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106409]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106412]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Mar 21 14:43:39 np0005654373.novalocal sudo[106412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106412]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106415]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:39 np0005654373.novalocal sudo[106415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106415]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:39 np0005654373.novalocal sudo[106418]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Mar 21 14:43:39 np0005654373.novalocal sudo[106418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:39 np0005654373.novalocal sudo[106418]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106421]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 21 14:43:40 np0005654373.novalocal sudo[106421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106421]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106424]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106424]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106427]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106427]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106430]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106430]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106433]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106433]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106436]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106436]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106439]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Mar 21 14:43:40 np0005654373.novalocal sudo[106439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106439]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106442]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106442]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106445]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106445]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106448]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106448]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106451]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Mar 21 14:43:40 np0005654373.novalocal sudo[106451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106451]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106454]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106454]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106457]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106457]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106460]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106460]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106463]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106463]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106466]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106466]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106469]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Mar 21 14:43:40 np0005654373.novalocal sudo[106469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106469]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106472]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Mar 21 14:43:40 np0005654373.novalocal sudo[106472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106472]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106475]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Mar 21 14:43:40 np0005654373.novalocal sudo[106475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106475]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106478]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Mar 21 14:43:40 np0005654373.novalocal sudo[106478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106478]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106481]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Mar 21 14:43:40 np0005654373.novalocal sudo[106481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106481]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106484]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:40 np0005654373.novalocal sudo[106484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106484]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106487]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106487]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106490]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106490]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106493]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106493]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106496]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106496]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106499]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106499]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106502]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106502]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106505]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106505]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106508]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106508]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106511]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106511]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106514]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106514]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106517]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Mar 21 14:43:40 np0005654373.novalocal sudo[106517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106517]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106520]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:40 np0005654373.novalocal sudo[106520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106520]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:40 np0005654373.novalocal sudo[106523]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:40 np0005654373.novalocal sudo[106523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:40 np0005654373.novalocal sudo[106523]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106526]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106526]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106529]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Mar 21 14:43:41 np0005654373.novalocal sudo[106529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106529]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106532]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Mar 21 14:43:41 np0005654373.novalocal sudo[106532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106532]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106535]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Mar 21 14:43:41 np0005654373.novalocal sudo[106535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106535]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106538]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Mar 21 14:43:41 np0005654373.novalocal sudo[106538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106538]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106541]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Mar 21 14:43:41 np0005654373.novalocal sudo[106541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106541]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106544]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106544]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106547]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106547]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106550]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106550]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106553]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Mar 21 14:43:41 np0005654373.novalocal sudo[106553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106553]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106556]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106556]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106559]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106559]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106562]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Mar 21 14:43:41 np0005654373.novalocal sudo[106562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106562]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106565]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106565]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106568]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Mar 21 14:43:41 np0005654373.novalocal sudo[106568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106568]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106571]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:41 np0005654373.novalocal sudo[106571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106571]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106574]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Mar 21 14:43:41 np0005654373.novalocal sudo[106574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106574]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106577]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Mar 21 14:43:41 np0005654373.novalocal sudo[106577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106577]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106580]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Mar 21 14:43:41 np0005654373.novalocal sudo[106580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106580]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106583]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Mar 21 14:43:41 np0005654373.novalocal sudo[106583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106583]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106586]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Mar 21 14:43:41 np0005654373.novalocal sudo[106586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106586]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106589]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Mar 21 14:43:41 np0005654373.novalocal sudo[106589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106589]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106592]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Mar 21 14:43:41 np0005654373.novalocal sudo[106592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106592]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106595]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Mar 21 14:43:41 np0005654373.novalocal sudo[106595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106595]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106598]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:41 np0005654373.novalocal sudo[106598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106598]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106601]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106601]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106604]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Mar 21 14:43:41 np0005654373.novalocal sudo[106604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106604]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106607]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Mar 21 14:43:41 np0005654373.novalocal sudo[106607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106607]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106610]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106610]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106613]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106613]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106616]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106616]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106619]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106619]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106622]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106622]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106625]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106625]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106628]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106628]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:41 np0005654373.novalocal sudo[106631]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Mar 21 14:43:41 np0005654373.novalocal sudo[106631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:41 np0005654373.novalocal sudo[106631]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106634]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106634]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106637]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106637]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106640]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106640]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106643]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106643]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106646]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106646]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106649]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106649]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106652]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106652]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106655]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106655]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106658]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Mar 21 14:43:42 np0005654373.novalocal sudo[106658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106658]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106663]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Mar 21 14:43:42 np0005654373.novalocal sudo[106663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106663]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106672]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106672]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106675]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106675]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106706]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106706]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106709]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106709]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106712]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106712]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106715]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106715]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106718]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106718]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106721]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106721]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106724]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106724]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106727]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106727]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106730]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Mar 21 14:43:42 np0005654373.novalocal sudo[106730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106730]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106733]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106733]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106736]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Mar 21 14:43:42 np0005654373.novalocal sudo[106736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106736]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106739]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106739]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106742]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106742]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106745]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106745]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106748]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106748]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106751]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106751]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106754]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-neutron_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106754]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106757]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106757]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106760]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106760]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106763]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106763]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106766]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106766]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106769]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106769]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106772]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106772]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106775]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106775]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106778]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Mar 21 14:43:42 np0005654373.novalocal sudo[106778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106778]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106781]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Mar 21 14:43:42 np0005654373.novalocal sudo[106781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106781]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106784]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Mar 21 14:43:42 np0005654373.novalocal sudo[106784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106784]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:42 np0005654373.novalocal sudo[106787]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Mar 21 14:43:42 np0005654373.novalocal sudo[106787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:42 np0005654373.novalocal sudo[106787]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106790]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Mar 21 14:43:43 np0005654373.novalocal sudo[106790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106790]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106793]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Mar 21 14:43:43 np0005654373.novalocal sudo[106793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106793]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106796]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Mar 21 14:43:43 np0005654373.novalocal sudo[106796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106796]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106799]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Mar 21 14:43:43 np0005654373.novalocal sudo[106799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106799]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106802]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Mar 21 14:43:43 np0005654373.novalocal sudo[106802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106802]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106805]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Mar 21 14:43:43 np0005654373.novalocal sudo[106805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106805]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106808]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Mar 21 14:43:43 np0005654373.novalocal sudo[106808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106808]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106811]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Mar 21 14:43:43 np0005654373.novalocal sudo[106811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106811]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106814]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Mar 21 14:43:43 np0005654373.novalocal sudo[106814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106814]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106817]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Mar 21 14:43:43 np0005654373.novalocal sudo[106817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106817]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106820]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Mar 21 14:43:43 np0005654373.novalocal sudo[106820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106820]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106823]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Mar 21 14:43:43 np0005654373.novalocal sudo[106823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106823]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106826]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Mar 21 14:43:43 np0005654373.novalocal sudo[106826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106826]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106829]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Mar 21 14:43:43 np0005654373.novalocal sudo[106829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106829]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106832]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Mar 21 14:43:43 np0005654373.novalocal sudo[106832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106832]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106835]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Mar 21 14:43:43 np0005654373.novalocal sudo[106835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106835]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106838]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Mar 21 14:43:43 np0005654373.novalocal sudo[106838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106838]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106841]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Mar 21 14:43:43 np0005654373.novalocal sudo[106841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106841]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106844]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Mar 21 14:43:43 np0005654373.novalocal sudo[106844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106844]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106847]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:43 np0005654373.novalocal sudo[106847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106847]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106850]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Mar 21 14:43:43 np0005654373.novalocal sudo[106850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106850]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106853]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Mar 21 14:43:43 np0005654373.novalocal sudo[106853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106853]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106856]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Mar 21 14:43:43 np0005654373.novalocal sudo[106856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106856]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106859]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Mar 21 14:43:43 np0005654373.novalocal sudo[106859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106859]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106862]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Mar 21 14:43:43 np0005654373.novalocal sudo[106862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106862]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106865]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Mar 21 14:43:43 np0005654373.novalocal sudo[106865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106865]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106868]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Mar 21 14:43:43 np0005654373.novalocal sudo[106868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106868]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106871]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Mar 21 14:43:43 np0005654373.novalocal sudo[106871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106871]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106874]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Mar 21 14:43:43 np0005654373.novalocal sudo[106874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106874]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106877]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Mar 21 14:43:43 np0005654373.novalocal sudo[106877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106877]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106880]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Mar 21 14:43:43 np0005654373.novalocal sudo[106880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106880]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106883]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Mar 21 14:43:43 np0005654373.novalocal sudo[106883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106883]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106886]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Mar 21 14:43:43 np0005654373.novalocal sudo[106886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106886]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106889]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Mar 21 14:43:43 np0005654373.novalocal sudo[106889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106889]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106892]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Mar 21 14:43:43 np0005654373.novalocal sudo[106892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106892]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106895]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Mar 21 14:43:43 np0005654373.novalocal sudo[106895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106895]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106898]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Mar 21 14:43:43 np0005654373.novalocal sudo[106898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106898]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106901]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Mar 21 14:43:43 np0005654373.novalocal sudo[106901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106901]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106904]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Mar 21 14:43:43 np0005654373.novalocal sudo[106904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106904]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:43 np0005654373.novalocal sudo[106907]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Mar 21 14:43:43 np0005654373.novalocal sudo[106907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:43 np0005654373.novalocal sudo[106907]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106910]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Mar 21 14:43:44 np0005654373.novalocal sudo[106910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106910]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106913]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Mar 21 14:43:44 np0005654373.novalocal sudo[106913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106913]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106916]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005654373.novalocal.pem Mar 21 14:43:44 np0005654373.novalocal sudo[106916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106916]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106919]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Mar 21 14:43:44 np0005654373.novalocal sudo[106919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106919]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106922]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Mar 21 14:43:44 np0005654373.novalocal sudo[106922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106922]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106925]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Mar 21 14:43:44 np0005654373.novalocal sudo[106925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106925]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106928]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Mar 21 14:43:44 np0005654373.novalocal sudo[106928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106928]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106931]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Mar 21 14:43:44 np0005654373.novalocal sudo[106931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106931]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106934]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Mar 21 14:43:44 np0005654373.novalocal sudo[106934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106934]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106937]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Mar 21 14:43:44 np0005654373.novalocal sudo[106937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106937]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106940]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Mar 21 14:43:44 np0005654373.novalocal sudo[106940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106940]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106943]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Mar 21 14:43:44 np0005654373.novalocal sudo[106943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106943]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106946]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Mar 21 14:43:44 np0005654373.novalocal sudo[106946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106946]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106949]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Mar 21 14:43:44 np0005654373.novalocal sudo[106949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106949]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106952]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Mar 21 14:43:44 np0005654373.novalocal sudo[106952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106952]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106955]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Mar 21 14:43:44 np0005654373.novalocal sudo[106955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106955]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106958]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Mar 21 14:43:44 np0005654373.novalocal sudo[106958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106958]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106961]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Mar 21 14:43:44 np0005654373.novalocal sudo[106961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106961]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106964]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Mar 21 14:43:44 np0005654373.novalocal sudo[106964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106964]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106967]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Mar 21 14:43:44 np0005654373.novalocal sudo[106967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106967]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106970]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Mar 21 14:43:44 np0005654373.novalocal sudo[106970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106970]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106973]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Mar 21 14:43:44 np0005654373.novalocal sudo[106973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106973]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106976]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Mar 21 14:43:44 np0005654373.novalocal sudo[106976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106976]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106979]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Mar 21 14:43:44 np0005654373.novalocal sudo[106979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106979]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106982]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Mar 21 14:43:44 np0005654373.novalocal sudo[106982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106982]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106985]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Mar 21 14:43:44 np0005654373.novalocal sudo[106985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106985]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106988]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Mar 21 14:43:44 np0005654373.novalocal sudo[106988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106988]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106991]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Mar 21 14:43:44 np0005654373.novalocal sudo[106991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106991]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106994]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Mar 21 14:43:44 np0005654373.novalocal sudo[106994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106994]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[106997]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Mar 21 14:43:44 np0005654373.novalocal sudo[106997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[106997]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[107000]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./periodic-workers.log Mar 21 14:43:44 np0005654373.novalocal sudo[107000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[107000]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[107003]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rpc-server.log Mar 21 14:43:44 np0005654373.novalocal sudo[107003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[107003]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[107006]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Mar 21 14:43:44 np0005654373.novalocal sudo[107006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[107006]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:44 np0005654373.novalocal sudo[107009]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Mar 21 14:43:44 np0005654373.novalocal sudo[107009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:44 np0005654373.novalocal sudo[107009]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107012]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Mar 21 14:43:45 np0005654373.novalocal sudo[107012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107012]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107015]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-maintenance-worker.log Mar 21 14:43:45 np0005654373.novalocal sudo[107015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107015]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107018]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Mar 21 14:43:45 np0005654373.novalocal sudo[107018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107018]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107021]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Mar 21 14:43:45 np0005654373.novalocal sudo[107021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107021]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107024]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Mar 21 14:43:45 np0005654373.novalocal sudo[107024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107024]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107027]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Mar 21 14:43:45 np0005654373.novalocal sudo[107027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107027]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107030]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Mar 21 14:43:45 np0005654373.novalocal sudo[107030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107030]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107033]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Mar 21 14:43:45 np0005654373.novalocal sudo[107033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107033]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107036]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Mar 21 14:43:45 np0005654373.novalocal sudo[107036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107036]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107039]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Mar 21 14:43:45 np0005654373.novalocal sudo[107039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107039]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107042]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Mar 21 14:43:45 np0005654373.novalocal sudo[107042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107042]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107045]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Mar 21 14:43:45 np0005654373.novalocal sudo[107045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107045]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107048]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Mar 21 14:43:45 np0005654373.novalocal sudo[107048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107048]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107051]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Mar 21 14:43:45 np0005654373.novalocal sudo[107051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107051]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107054]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Mar 21 14:43:45 np0005654373.novalocal sudo[107054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107054]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107057]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Mar 21 14:43:45 np0005654373.novalocal sudo[107057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107057]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107060]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Mar 21 14:43:45 np0005654373.novalocal sudo[107060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107060]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107063]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Mar 21 14:43:45 np0005654373.novalocal sudo[107063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107063]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107066]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Mar 21 14:43:45 np0005654373.novalocal sudo[107066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107066]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107069]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Mar 21 14:43:45 np0005654373.novalocal sudo[107069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107069]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107072]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Mar 21 14:43:45 np0005654373.novalocal sudo[107072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107072]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107075]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Mar 21 14:43:45 np0005654373.novalocal sudo[107075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107075]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107078]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Mar 21 14:43:45 np0005654373.novalocal sudo[107078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107078]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107081]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Mar 21 14:43:45 np0005654373.novalocal sudo[107081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107081]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107084]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Mar 21 14:43:45 np0005654373.novalocal sudo[107084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107084]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107087]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Mar 21 14:43:45 np0005654373.novalocal sudo[107087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107087]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107090]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Mar 21 14:43:45 np0005654373.novalocal sudo[107090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107090]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107093]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Mar 21 14:43:45 np0005654373.novalocal sudo[107093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107093]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107096]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Mar 21 14:43:45 np0005654373.novalocal sudo[107096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107096]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107099]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Mar 21 14:43:45 np0005654373.novalocal sudo[107099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107099]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107102]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Mar 21 14:43:45 np0005654373.novalocal sudo[107102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107102]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107105]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Mar 21 14:43:45 np0005654373.novalocal sudo[107105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107105]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107108]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Mar 21 14:43:45 np0005654373.novalocal sudo[107108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107108]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107111]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Mar 21 14:43:45 np0005654373.novalocal sudo[107111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107111]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107114]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Mar 21 14:43:45 np0005654373.novalocal sudo[107114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107114]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107117]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Mar 21 14:43:45 np0005654373.novalocal sudo[107117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107117]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107120]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Mar 21 14:43:45 np0005654373.novalocal sudo[107120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107120]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107123]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Mar 21 14:43:45 np0005654373.novalocal sudo[107123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107123]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:45 np0005654373.novalocal sudo[107126]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Mar 21 14:43:45 np0005654373.novalocal sudo[107126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:45 np0005654373.novalocal sudo[107126]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107129]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Mar 21 14:43:46 np0005654373.novalocal sudo[107129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107129]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107132]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Mar 21 14:43:46 np0005654373.novalocal sudo[107132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107132]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107135]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Mar 21 14:43:46 np0005654373.novalocal sudo[107135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107135]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107138]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Mar 21 14:43:46 np0005654373.novalocal sudo[107138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107138]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107141]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Mar 21 14:43:46 np0005654373.novalocal sudo[107141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107141]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107144]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Mar 21 14:43:46 np0005654373.novalocal sudo[107144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107144]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107147]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Mar 21 14:43:46 np0005654373.novalocal sudo[107147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107147]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107150]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Mar 21 14:43:46 np0005654373.novalocal sudo[107150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107150]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107153]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Mar 21 14:43:46 np0005654373.novalocal sudo[107153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107153]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107156]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000b.log Mar 21 14:43:46 np0005654373.novalocal sudo[107156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107156]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107159]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Mar 21 14:43:46 np0005654373.novalocal sudo[107159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107159]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107162]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Mar 21 14:43:46 np0005654373.novalocal sudo[107162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107162]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107165]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Mar 21 14:43:46 np0005654373.novalocal sudo[107165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107165]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107168]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Mar 21 14:43:46 np0005654373.novalocal sudo[107168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107168]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107171]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Mar 21 14:43:46 np0005654373.novalocal sudo[107171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107171]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107174]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Mar 21 14:43:46 np0005654373.novalocal sudo[107174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107174]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107177]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Mar 21 14:43:46 np0005654373.novalocal sudo[107177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107177]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107180]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Mar 21 14:43:46 np0005654373.novalocal sudo[107180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107180]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107183]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Mar 21 14:43:46 np0005654373.novalocal sudo[107183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107183]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107186]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Mar 21 14:43:46 np0005654373.novalocal sudo[107186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107186]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107189]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Mar 21 14:43:46 np0005654373.novalocal sudo[107189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107189]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107192]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Mar 21 14:43:46 np0005654373.novalocal sudo[107192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107192]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107195]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Mar 21 14:43:46 np0005654373.novalocal sudo[107195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107195]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107198]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Mar 21 14:43:46 np0005654373.novalocal sudo[107198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107198]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107201]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Mar 21 14:43:46 np0005654373.novalocal sudo[107201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107201]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107204]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107204]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107207]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107207]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107210]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107210]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107213]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107213]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107216]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107216]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107219]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107219]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107222]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107222]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107225]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107225]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107228]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107228]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107231]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Mar 21 14:43:46 np0005654373.novalocal sudo[107231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107231]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107234]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Mar 21 14:43:46 np0005654373.novalocal sudo[107234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107234]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:46 np0005654373.novalocal sudo[107237]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Mar 21 14:43:46 np0005654373.novalocal sudo[107237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:46 np0005654373.novalocal sudo[107237]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107240]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107240]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107243]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107243]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107246]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107246]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107249]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107249]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107252]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107252]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107255]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107255]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107258]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107258]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107261]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Mar 21 14:43:47 np0005654373.novalocal sudo[107261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107261]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107264]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Mar 21 14:43:47 np0005654373.novalocal sudo[107264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107264]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107267]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Mar 21 14:43:47 np0005654373.novalocal sudo[107267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107267]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107270]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107270]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107273]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Mar 21 14:43:47 np0005654373.novalocal sudo[107273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107273]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107276]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Mar 21 14:43:47 np0005654373.novalocal sudo[107276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107276]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107279]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Mar 21 14:43:47 np0005654373.novalocal sudo[107279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107279]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107282]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Mar 21 14:43:47 np0005654373.novalocal sudo[107282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107282]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107285]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Mar 21 14:43:47 np0005654373.novalocal sudo[107285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107285]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107288]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107288]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107291]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107291]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107294]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107294]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107297]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107297]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107300]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107300]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107303]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Mar 21 14:43:47 np0005654373.novalocal sudo[107303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107303]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107306]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Mar 21 14:43:47 np0005654373.novalocal sudo[107306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107306]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107309]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107309]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107312]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107312]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107315]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107315]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107318]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107318]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107321]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107321]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107324]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107324]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107327]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107327]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107330]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107330]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107333]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107333]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107336]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107336]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107339]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107339]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107342]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Mar 21 14:43:47 np0005654373.novalocal sudo[107342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:47 np0005654373.novalocal sudo[107342]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:47 np0005654373.novalocal sudo[107345]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107345]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107348]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107348]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107351]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107351]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107354]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107354]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107357]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107357]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107360]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107360]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107363]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107363]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107366]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107366]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107369]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107369]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107372]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107372]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107375]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107375]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107378]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107378]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107381]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107381]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107384]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107384]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107387]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Mar 21 14:43:48 np0005654373.novalocal sudo[107387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107387]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[106125]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Mar 21 14:43:48 np0005654373.novalocal sudo[107392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107392]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Mar 21 14:43:48 np0005654373.novalocal sudo[107395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107398]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Mar 21 14:43:48 np0005654373.novalocal sudo[107398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107398]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107401]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Mar 21 14:43:48 np0005654373.novalocal sudo[107401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107401]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107404]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Mar 21 14:43:48 np0005654373.novalocal sudo[107404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107404]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107409]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Mar 21 14:43:48 np0005654373.novalocal sudo[107409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107409]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107412]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Mar 21 14:43:48 np0005654373.novalocal sudo[107412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107412]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107415]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Mar 21 14:43:48 np0005654373.novalocal sudo[107415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107415]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107418]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Mar 21 14:43:48 np0005654373.novalocal sudo[107418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107418]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107421]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107421]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107424]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107424]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107427]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107427]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107430]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107430]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107433]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107433]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107436]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107436]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107439]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107439]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107442]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107442]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107445]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107445]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107448]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107448]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107451]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107451]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107454]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107454]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:48 np0005654373.novalocal sudo[107457]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Mar 21 14:43:48 np0005654373.novalocal sudo[107457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:48 np0005654373.novalocal sudo[107457]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107460]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Mar 21 14:43:49 np0005654373.novalocal sudo[107460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107460]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107463]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Mar 21 14:43:49 np0005654373.novalocal sudo[107463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107463]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107466]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Mar 21 14:43:49 np0005654373.novalocal sudo[107466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107466]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107469]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Mar 21 14:43:49 np0005654373.novalocal sudo[107469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107469]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107472]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Mar 21 14:43:49 np0005654373.novalocal sudo[107472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107472]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107475]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Mar 21 14:43:49 np0005654373.novalocal sudo[107475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107475]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107478]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Mar 21 14:43:49 np0005654373.novalocal sudo[107478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107478]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107395]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260321_142747.log /var/log/weirdo-project/logs/puppet-20260321_142747.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107482]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260321_143035.log /var/log/weirdo-project/logs/puppet-20260321_143035.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107485]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107488]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107491]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107494]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107497]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107500]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107503]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107506]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107509]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107512]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107515]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107518]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107518]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107521]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107521]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107524]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107524]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107527]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107527]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107530]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107530]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107533]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107533]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107536]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/periodic-workers.log /var/log/weirdo-project/logs/neutron/periodic-workers.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107536]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107539]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/rpc-server.log /var/log/weirdo-project/logs/neutron/rpc-server.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107539]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107542]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/app.log /var/log/weirdo-project/logs/neutron/app.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107542]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107545]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107548]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107551]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.log /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107551]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107554]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107554]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107557]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107557]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107560]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107560]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107563]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107566]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107569]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107572]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107575]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Mar 21 14:43:49 np0005654373.novalocal sudo[107578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:49 np0005654373.novalocal sudo[107578]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:49 np0005654373.novalocal sudo[107581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/app.log /var/log/weirdo-project/logs/octavia/app.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107581]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107584]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107587]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107590]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107593]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107596]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107599]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107602]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107605]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107608]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107608]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107611]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107614]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107617]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107620]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107623]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107626]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107626]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107629]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107629]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107632]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107635]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107638]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107641]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107644]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107647]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107650]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107650]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107653]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107653]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107656]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107656]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107659]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107662]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107665]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107665]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107668]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107671]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107674]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107677]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:50 np0005654373.novalocal sudo[107680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Mar 21 14:43:50 np0005654373.novalocal sudo[107680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:50 np0005654373.novalocal sudo[107680]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107683]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107683]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107686]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107686]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107689]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107689]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107692]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107692]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107695]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107695]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107698]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107698]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107701]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107701]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107704]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107704]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107707]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107707]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107710]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107713]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107716]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107716]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107719]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107719]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107722]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107722]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107725]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107725]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107728]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107728]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107731]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107731]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107734]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107734]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107737]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107737]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107740]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107740]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107743]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107743]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107746]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107746]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107749]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107749]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107753]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107756]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107759]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107762]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107765]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107768]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107771]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107774]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107777]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107780]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107783]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107786]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107789]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:51 np0005654373.novalocal sudo[107792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Mar 21 14:43:51 np0005654373.novalocal sudo[107792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:51 np0005654373.novalocal sudo[107792]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107795]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107798]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107801]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107804]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107807]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107810]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107813]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107816]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107819]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107822]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107822]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107825]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107825]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107828]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107828]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107831]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107831]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107834]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107834]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107837]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107837]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107840]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107840]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107843]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107843]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107846]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107846]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107849]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107849]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107852]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107852]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107855]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107855]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107858]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107858]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107861]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107861]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107864]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107864]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107867]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107867]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107870]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107870]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107873]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107873]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107876]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107876]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107879]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107879]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107882]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107882]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107885]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107888]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107891]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107894]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Mar 21 14:43:52 np0005654373.novalocal sudo[107897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:52 np0005654373.novalocal sudo[107897]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:52 np0005654373.novalocal sudo[107900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107900]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107903]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107906]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107909]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107909]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107912]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107915]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107915]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107918]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107918]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107921]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107921]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107924]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107924]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107927]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107927]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107930]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107930]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107933]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107933]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107936]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107936]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107939]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107939]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107942]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107942]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107945]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107945]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107948]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107948]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107951]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107951]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107954]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107957]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107957]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107960]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107963]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107966]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107969]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107972]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107972]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107975]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107975]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107978]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107978]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107981]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107984]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107987]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107990]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107993]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107996]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[107999]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:53 np0005654373.novalocal sudo[107999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[107999]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[108002]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Mar 21 14:43:53 np0005654373.novalocal sudo[108002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[108002]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[108005]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Mar 21 14:43:53 np0005654373.novalocal sudo[108005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[108005]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[108008]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Mar 21 14:43:53 np0005654373.novalocal sudo[108008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[108008]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[108011]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Mar 21 14:43:53 np0005654373.novalocal sudo[108011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[108011]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:53 np0005654373.novalocal sudo[108014]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Mar 21 14:43:53 np0005654373.novalocal sudo[108014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:53 np0005654373.novalocal sudo[108014]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108017]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108017]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108020]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108020]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108023]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108023]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108026]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108026]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108029]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108029]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108032]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108032]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108035]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108035]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108038]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108038]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108041]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108041]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108044]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108044]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108047]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108047]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108050]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108050]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108053]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108053]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108056]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108056]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108059]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108059]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108062]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108062]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108065]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108065]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108068]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108068]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108071]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108071]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108074]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108074]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108077]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108077]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108080]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108080]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108083]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108083]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108086]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108086]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108089]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108089]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108092]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108092]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108095]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108095]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108098]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108098]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108101]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108101]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108104]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108104]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108107]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108107]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:54 np0005654373.novalocal sudo[108110]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Mar 21 14:43:54 np0005654373.novalocal sudo[108110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:54 np0005654373.novalocal sudo[108110]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108113]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108113]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108116]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108116]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108119]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108119]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108122]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108122]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108125]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108128]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108131]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108131]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108134]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108134]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108137]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108137]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108140]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108140]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108143]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108143]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108146]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108146]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108149]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108149]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108152]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108152]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108155]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108155]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108158]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108158]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108161]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108164]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108164]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108167]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108167]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108170]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108170]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108173]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108173]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108176]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108176]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108179]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108179]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108182]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108182]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108185]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108185]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108188]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108188]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108191]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108191]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108194]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108194]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108197]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108197]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108200]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108200]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108203]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108203]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108206]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108206]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108209]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108209]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108212]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108212]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108215]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Mar 21 14:43:55 np0005654373.novalocal sudo[108215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:55 np0005654373.novalocal sudo[108215]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:55 np0005654373.novalocal sudo[108218]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108218]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108221]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108221]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108224]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108224]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108227]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108227]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108230]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108230]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108233]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108233]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108236]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005654373.novalocal.pem.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108236]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108239]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108239]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108242]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108242]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108245]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108245]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108248]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108248]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108251]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108251]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108254]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108254]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108257]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108257]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108260]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108260]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108263]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108263]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108266]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108266]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108269]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108269]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108272]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108272]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108275]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108275]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108278]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108278]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108281]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108281]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108284]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108284]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108287]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108287]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108290]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108293]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108296]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108299]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108302]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108305]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108308]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108311]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:56 np0005654373.novalocal sudo[108314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Mar 21 14:43:56 np0005654373.novalocal sudo[108314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:56 np0005654373.novalocal sudo[108314]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108317]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108320]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108323]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108326]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108329]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108332]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108335]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108338]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108341]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108344]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108347]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108350]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108353]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108356]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108359]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108362]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108365]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108368]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108371]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108374]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108377]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108380]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108380]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108383]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108386]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108389]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108392]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108395]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108398]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108401]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108408]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108408]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108411]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108414]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108417]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108420]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108423]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108426]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108429]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108432]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:57 np0005654373.novalocal sudo[108435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Mar 21 14:43:57 np0005654373.novalocal sudo[108435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:57 np0005654373.novalocal sudo[108435]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108438]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108441]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108444]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108447]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108450]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005654373.novalocal.pem.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108453]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108456]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108459]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108462]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108465]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108468]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108471]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108474]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108477]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108480]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108483]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108486]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108487]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Mar 21 14:43:58 np0005654373.novalocal sudo[108492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Mar 21 14:43:58 np0005654373.novalocal systemd[1]: Started Session c299 of User root. Mar 21 14:43:58 np0005654373.novalocal sudo[108492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108487]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:43:58 np0005654373.novalocal sudo[108492]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108497]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108500]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108503]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108506]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108509]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108512]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108515]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108519]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108522]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108487]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Mar 21 14:43:58 np0005654373.novalocal sudo[108525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108525]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:58 np0005654373.novalocal sudo[108527]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:43:58 np0005654373.novalocal systemd[1]: Started Session c300 of User root. Mar 21 14:43:58 np0005654373.novalocal sudo[108529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005654373.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005654373.novalocal.pem.txt Mar 21 14:43:58 np0005654373.novalocal sudo[108527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:43:58 np0005654373.novalocal sudo[108529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:58 np0005654373.novalocal sudo[108529]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108534]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108537]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108540]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108543]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108546]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108549]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108552]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108556]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108559]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108527]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Mar 21 14:43:59 np0005654373.novalocal sudo[108562]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Mar 21 14:43:59 np0005654373.novalocal sudo[108562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108562]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108564]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Mar 21 14:43:59 np0005654373.novalocal sudo[108566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Mar 21 14:43:59 np0005654373.novalocal systemd[1]: Started Session c301 of User root. Mar 21 14:43:59 np0005654373.novalocal sudo[108564]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:43:59 np0005654373.novalocal sudo[108566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Mar 21 14:43:59 np0005654373.novalocal sudo[108566]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[105247]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108681]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tvdgxvpedhtfgnlmhbdzfcylrmymeryd ; /usr/bin/python3' Mar 21 14:43:59 np0005654373.novalocal sudo[108681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:43:59 np0005654373.novalocal sudo[108564]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Mar 21 14:43:59 np0005654373.novalocal sudo[108685]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Mar 21 14:43:59 np0005654373.novalocal systemd[1]: Started Session c302 of User root. Mar 21 14:43:59 np0005654373.novalocal sudo[108685]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Mar 21 14:43:59 np0005654373.novalocal python3[108684]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:43:59 np0005654373.novalocal sudo[108681]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal sudo[108693]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ibcvyhkgrfmucevbqongytddxovlrxdf ; /usr/bin/python3' Mar 21 14:43:59 np0005654373.novalocal sudo[108693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:43:59 np0005654373.novalocal sudo[108685]: pam_unix(sudo:session): session closed for user root Mar 21 14:43:59 np0005654373.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Mar 21 14:43:59 np0005654373.novalocal python3[108695]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:00 np0005654373.novalocal sudo[108693]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:00 np0005654373.novalocal systemd[1]: Starting system activity accounting tool... Mar 21 14:44:00 np0005654373.novalocal sudo[108701]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vcghggnzbxasaqejgbbqbjbrkzelbewj ; /usr/bin/python3' Mar 21 14:44:00 np0005654373.novalocal sudo[108701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:00 np0005654373.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Mar 21 14:44:00 np0005654373.novalocal systemd[1]: Finished system activity accounting tool. Mar 21 14:44:00 np0005654373.novalocal python3[108704]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:00 np0005654373.novalocal sudo[108701]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:00 np0005654373.novalocal sudo[108710]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ocfjsvwgpfasolpfjvlfrinfiupjbrei ; /usr/bin/python3' Mar 21 14:44:00 np0005654373.novalocal sudo[108710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:00 np0005654373.novalocal python3[108712]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:00 np0005654373.novalocal sudo[108710]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:00 np0005654373.novalocal sudo[108717]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mwyshwtfcutavfekyubwqikoqgyxbhvk ; /usr/bin/python3' Mar 21 14:44:00 np0005654373.novalocal sudo[108717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:00 np0005654373.novalocal python3[108719]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:00 np0005654373.novalocal sudo[108717]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:00 np0005654373.novalocal sudo[108724]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mjlehpcwszpcyottnsxwpdxwnrlpogxm ; /usr/bin/python3' Mar 21 14:44:00 np0005654373.novalocal sudo[108724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:00 np0005654373.novalocal python3[108726]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:00 np0005654373.novalocal sudo[108724]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:00 np0005654373.novalocal sudo[108731]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hvjrokcrftiegsaxiajkcdwrtkdcrctv ; /usr/bin/python3' Mar 21 14:44:00 np0005654373.novalocal sudo[108731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:01 np0005654373.novalocal python3[108733]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:01 np0005654373.novalocal sudo[108731]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:01 np0005654373.novalocal sudo[108738]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qssaeaipkululykzxvifoleedwaeksjh ; /usr/bin/python3' Mar 21 14:44:01 np0005654373.novalocal sudo[108738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:01 np0005654373.novalocal python3[108740]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:01 np0005654373.novalocal sudo[108738]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:01 np0005654373.novalocal sudo[108745]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bcsoeuxrjfvfbugfxldqjnuzqmunwjyq ; /usr/bin/python3' Mar 21 14:44:01 np0005654373.novalocal sudo[108745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:01 np0005654373.novalocal python3[108747]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:01 np0005654373.novalocal sudo[108745]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:01 np0005654373.novalocal sudo[108752]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ixfdsznklvthmygltndkstpaqxouunvr ; /usr/bin/python3' Mar 21 14:44:01 np0005654373.novalocal sudo[108752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:01 np0005654373.novalocal python3[108754]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Mar 21 14:44:01 np0005654373.novalocal sudo[108752]: pam_unix(sudo:session): session closed for user root Mar 21 14:44:01 np0005654373.novalocal sudo[108759]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yarspvacjsaycxwiwqgpnfebkiagjnbf ; /usr/bin/python3' Mar 21 14:44:01 np0005654373.novalocal sudo[108759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Mar 21 14:44:02 np0005654373.novalocal python3[108761]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None